CVE-2006-3913

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-3913
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-3913.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-3913
Related
Published
2006-07-28T00:04:00Z
Modified
2024-11-21T00:14:41Z
Summary
[none]
Details

Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul 2006 and earlier, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) negative chunklength or a (2) large chunk->offset value in a PACKETPLAYERATTRIBUTECHUNK packet in the generichandleplayerattributechunk function in common/packets.c, and (3) a large packet->length value in the handleunitorders function in server/unithand.c.

References

Affected packages

Debian:11 / freeciv

Package

Name
freeciv
Purl
pkg:deb/debian/freeciv?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.8-3

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / freeciv

Package

Name
freeciv
Purl
pkg:deb/debian/freeciv?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.8-3

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / freeciv

Package

Name
freeciv
Purl
pkg:deb/debian/freeciv?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.8-3

Ecosystem specific

{
    "urgency": "medium"
}