5
CVSSv2

CVE-2006-4006

Published: 07/08/2006 Updated: 20/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The do_gameinfo function in BomberClone 0.11.6 and previous versions, and possibly other functions, does not reset the packet data size, which causes the send_pkg function (packets.c) to use this data size when sending a reply, and allows remote malicious users to read portions of server memory.

Vulnerable Product Search on Vulmon Subscribe to Product

bomberclone bomberclone

bomberclone bomberclone 0.11.3

bomberclone bomberclone 0.11.5

bomberclone bomberclone 0.11.4

Vendor Advisories

Debian Bug report logs - #382082 CVE-2006-400[56]: Multiple Remote Vulnerabilities in Bomberclone Package: bomberclone; Maintainer for bomberclone is Peter Spiess-Knafl <dev@spiessknaflat>; Source for bomberclone is src:bomberclone (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Tue, 8 Aug ...
Luigi Auriemma discovered two security related bugs in bomberclone, a free Bomberman clone The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4005 The program copies remotely provided data unchecked which could lead to a denial of service via an application crash CVE-2006-4006 Bomberclone use ...

Exploits

source: wwwsecurityfocuscom/bid/19255/info Bomberclone is prone to remote information-disclosure and denial-of-service vulnerabilities because it fails to properly sanitize user-supplied input These issues allow remote attackers to access sensitive information and to crash the application, denying further service to legitimate users V ...