Format string vulnerability in the (1) Con_message and (2) conPrintf functions in con_main.c in Doomsday engine 1.8.6 allows remote attackers to execute arbitrary code via format string specifiers in an argument to the JOIN command, and possibly other command arguments.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/archive/1/429857/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://securitytracker.com/id?1015860 | vdb-entry x_refsource_SECTRACK |
| http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml | vendor-advisory x_refsource_GENTOO |
| http://aluigi.altervista.org/adv/doomsdayfs-adv.txt | x_refsource_MISC |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25622 | vdb-entry x_refsource_XF |
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html | mailing-list x_refsource_FULLDISC |
| http://secunia.com/advisories/19519 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/bid/17369 | vdb-entry x_refsource_BID |
| http://secunia.com/advisories/19515 | third-party-advisory x_refsource_SECUNIA |
| http://www.vupen.com/english/advisories/2006/1221 | vdb-entry x_refsource_VUPEN |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/archive/1/429857/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
| http://securitytracker.com/id?1015860 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml | vendor-advisory x_refsource_GENTOO x_transferred |
| http://aluigi.altervista.org/adv/doomsdayfs-adv.txt | x_refsource_MISC x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25622 | vdb-entry x_refsource_XF x_transferred |
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html | mailing-list x_refsource_FULLDISC x_transferred |
| http://secunia.com/advisories/19519 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.securityfocus.com/bid/17369 | vdb-entry x_refsource_BID x_transferred |
| http://secunia.com/advisories/19515 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.vupen.com/english/advisories/2006/1221 | vdb-entry x_refsource_VUPEN x_transferred |