Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-2480

Опубликовано: 19 мая 2006
Источник: nvd
CVSS2: 5.1
EPSS Средний

Описание

Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:dia:dia:0.94:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.25823
Средний

5.1 Medium

CVSS2

Дефекты

CWE-134

Связанные уязвимости

ubuntu
больше 19 лет назад

Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.

redhat
больше 21 года назад

Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.

debian
больше 19 лет назад

Format string vulnerability in Dia 0.94 allows user-assisted attackers ...

github
больше 3 лет назад

Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.

EPSS

Процентиль: 96%
0.25823
Средний

5.1 Medium

CVSS2

Дефекты

CWE-134