Integer signedness error in the network_receive_packet function in socket.c in dimension 3 engine (dim3) 1.5 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large data_len value, which is cast to a signed short and results in a buffer overflow.
References
Link | Resource |
---|---|
http://aluigi.altervista.org/adv/dim3bof-adv.txt | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26082 | |
http://aluigi.altervista.org/adv/dim3bof-adv.txt | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26082 |
Configurations
History
No history.
Information
Published : 2007-03-02 21:18
Updated : 2025-04-09 00:30
NVD link : CVE-2006-7095
Mitre link : CVE-2006-7095
CVE.ORG link : CVE-2006-7095
JSON object : View
Products Affected
klink
- dim3
CWE