The raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a large ID, which causes an invalid memory access (buffer over-read).
Max CVSS
5.0
EPSS Score
4.69%
Published
2006-05-16
Updated
2018-10-18
Buffer overflow in raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to execute arbitrary code by sending packets with long global variables to the client.
Max CVSS
7.5
EPSS Score
13.90%
Published
2006-05-16
Updated
2018-10-18
raydium_network_netcall_exec function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a packet of type 0xFF, which causes a null dereference.
Max CVSS
5.0
EPSS Score
4.69%
Published
2006-05-16
Updated
2018-10-18
Format string vulnerability in the raydium_log function in console.c in Raydium before SVN revision 310 allows local users to execute arbitrary code via format string specifiers in the format parameter, which are not properly handled in a call to raydium_console_line_add.
Max CVSS
4.6
EPSS Score
1.71%
Published
2006-05-16
Updated
2018-10-18
Multiple buffer overflows in Raydium before SVN revision 310 allow remote attackers to execute arbitrary code via a large packet when logged via (1) the raydium_log function in log.c or (2) the raydium_console_line_add function in console.c, possibly from a long player name.
Max CVSS
7.5
EPSS Score
13.68%
Published
2006-05-16
Updated
2018-10-18
5 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!