CVE-2006-4006

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-4006
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2006-4006.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2006-4006
Related
Published
2006-08-07T19:04:00Z
Modified
2024-11-21T00:14:55Z
Summary
[none]
Details

The dogameinfo function in BomberClone 0.11.6 and earlier, and possibly other functions, does not reset the packet data size, which causes the sendpkg function (packets.c) to use this data size when sending a reply, and allows remote attackers to read portions of server memory.

References

Affected packages

Debian:11 / bomberclone

Package

Name
bomberclone
Purl
pkg:deb/debian/bomberclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.7-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / bomberclone

Package

Name
bomberclone
Purl
pkg:deb/debian/bomberclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.7-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / bomberclone

Package

Name
bomberclone
Purl
pkg:deb/debian/bomberclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.7-1

Ecosystem specific

{
    "urgency": "medium"
}