CVE-2006-1618

Doomsday engine <1.8.6 - RCE

Title source: llm
STIX 2.1

Description

Format string vulnerability in the (1) Con_message and (2) conPrintf functions in con_main.c in Doomsday engine 1.8.6 allows remote attackers to execute arbitrary code via format string specifiers in an argument to the JOIN command, and possibly other command arguments.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Luigi Auriemma · textdosmultiple
https://www.exploit-db.com/exploits/27566

References (10)

Core 10
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/429857/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015860
Third Party Advisory vendor-advisory x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml
Exploit, Vendor Advisory x_refsource_misc
http://aluigi.altervista.org/adv/doomsdayfs-adv.txt
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25622
Mailing List mailing-list x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19519
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17369
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19515
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1221

Scores

EPSS 0.2640
EPSS Percentile 96.3%

Details

Status published
Products (1)
doomsday/doomsday 1.8.6
Published Apr 05, 2006
Tracked Since Feb 18, 2026