ID CVE-2006-0771 Type cve Reporter cve@mitre.org Modified 2018-10-19T15:46:00
Description
Format string vulnerability in PunkBuster 1.180 and earlier, as used by Soldier of Fortune II and possibly other games, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in invalid cvar values, which are not properly handled when the server kicks the player and records the reason.
{"id": "CVE-2006-0771", "bulletinFamily": "NVD", "title": "CVE-2006-0771", "description": "Format string vulnerability in PunkBuster 1.180 and earlier, as used by Soldier of Fortune II and possibly other games, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in invalid cvar values, which are not properly handled when the server kicks the player and records the reason.", "published": "2006-02-18T21:02:00", "modified": "2018-10-19T15:46:00", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0771", "reporter": "cve@mitre.org", "references": ["http://www.securityfocus.com/bid/16703", "http://www.securityfocus.com/archive/1/425286/100/0/threaded", "https://exchange.xforce.ibmcloud.com/vulnerabilities/24792", "http://secunia.com/advisories/18917", "http://aluigi.altervista.org/adv/sof2pbfs-adv.txt", "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0372.html", "http://securityreason.com/securityalert/448"], "cvelist": ["CVE-2006-0771"], "type": "cve", "lastseen": "2020-12-09T19:23:44", "edition": 5, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:23268"]}], "modified": "2020-12-09T19:23:44", "rev": 2}, "score": {"value": 6.4, "vector": "NONE", "modified": "2020-12-09T19:23:44", "rev": 2}, "vulnersScore": 6.4}, "cpe": ["cpe:/a:even_balance:punkbuster:1.180"], "affectedSoftware": [{"cpeName": "even_balance:punkbuster", "name": "even balance punkbuster", "operator": "le", "version": "1.180"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:even_balance:punkbuster:1.180:*:*:*:*:*:*:*"], "cwe": ["CWE-134"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:even_balance:punkbuster:1.180:*:*:*:*:*:*:*", "versionEndIncluding": "1.180", "vulnerable": true}], "operator": "OR"}]}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:20", "bulletinFamily": "software", "cvelist": ["CVE-2006-0771"], "edition": 1, "description": "## Vulnerability Description\nSimple command line modification of a CVAR variable in the PunkBuster enabled server allows the user to DoS and possibly remote execution.\n## Solution Description\nA fix has released a fix for this issue\n## Short Description\nSimple command line modification of a CVAR variable in the PunkBuster enabled server allows the user to DoS and possibly remote execution.\n## References:\nVendor URL: http://www.punkbuster.com/\n[Secunia Advisory ID:18917](https://secuniaresearch.flexerasoftware.com/advisories/18917/)\nOther Advisory URL: http://aluigi.altervista.org/adv/sof2pbfs-adv.txt\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0372.html\n[CVE-2006-0771](https://vulners.com/cve/CVE-2006-0771)\nBugtraq ID: 16703\n", "modified": "2006-02-16T06:48:12", "published": "2006-02-16T06:48:12", "href": "https://vulners.com/osvdb/OSVDB:23268", "id": "OSVDB:23268", "title": "PunkBuster CVAR Command Remote Format String", "type": "osvdb", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}]}