Description
Format string vulnerability in the (1) Con_message and (2) conPrintf functions in con_main.c in Doomsday engine 1.8.6 allows remote attackers to execute arbitrary code via format string specifiers in an argument to the JOIN command, and possibly other command arguments.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Luigi Auriemma · textdosmultiple
https://www.exploit-db.com/exploits/27566
References (10)
Core 10
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/429857/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015860
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml
Exploit, Vendor Advisory x_refsource_misc
http://aluigi.altervista.org/adv/doomsdayfs-adv.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25622
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19519
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17369
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19515
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1221
Scores
EPSS
0.2640
EPSS Percentile
96.3%
Details
Status
published
Products (1)
doomsday/doomsday
1.8.6
Published
Apr 05, 2006
Tracked Since
Feb 18, 2026