Vulnerability CVE-2006-4573


Published: 2006-10-24   Modified: 2012-02-12

Description:
Multiple unspecified vulnerabilities in the "utf8 combining characters handling" (utf8_handle_comb function in encoding.c) in screen before 4.0.3 allows user-assisted attackers to cause a denial of service (crash or hang) via certain UTF8 sequences.

Vendor: GNU
Product: Screen 
Version: 4.0.2;

CVSS2 => (AV:N/AC:H/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://lists.gnu.org/archive/html/screen-users/2006-10/msg00028.html
http://www.vupen.com/english/advisories/2007/1939
http://www.vupen.com/english/advisories/2006/4189
https://issues.rpath.com/browse/RPL-734
http://www.ubuntu.com/usn/usn-370-1
http://www.securityfocus.com/bid/20727
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.026-screen.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:191
http://www.debian.org/security/2006/dsa-1202
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.480775
http://security.gentoo.org/glsa/glsa-200611-01.xml
http://secunia.com/advisories/25402
http://secunia.com/advisories/22726
http://secunia.com/advisories/22707
http://secunia.com/advisories/22649
http://secunia.com/advisories/22647
http://secunia.com/advisories/22611
http://secunia.com/advisories/22583
http://secunia.com/advisories/22573
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
http://docs.info.apple.com/article.html?artnum=305530

Related CVE
CVE-2019-1010025
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc.
CVE-2019-1010024
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc.
CVE-2019-1010023
GNU Libc current is affected by: Re-mapping current loaded libray with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to ...
CVE-2019-1010022
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack...
CVE-2019-12972
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section o...
CVE-2012-6711
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to p...
CVE-2018-12886
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack ...
CVE-2019-5953
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.

Copyright 2019, cxsecurity.com

 

Back to Top