CVE-2006-0460
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Multiple buffer overflows in BomberClone before 0.11.6.2 allow remote attackers to execute arbitrary code via long error messages..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:bomberclone:bomberclone:0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.9.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.9.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.11.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.10.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.9.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.11.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.11.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.11.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.9.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:bomberclone:bomberclone:0.9.6:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.gentoo.org/security/en/glsa/glsa-200602-09.xml
- http://www.securityfocus.com/bid/16697
- http://secunia.com/advisories/18914
- http://secunia.com/advisories/18915
- http://www.osvdb.org/23263
- http://www.debian.org/security/2006/dsa-997
- http://secunia.com/advisories/19210
- http://www.vupen.com/english/advisories/2006/0643
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24764
Get started for free to scan for vulnerabilites.
Download Mageni. It is free to get started and can be installed in Windows, macOS and Linux.