CVE-2006-4089
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/08/2006
Last modified:
03/04/2025
Description
Multiple buffer overflows in Andy Lo-A-Foe AlsaPlayer 0.99.76 and earlier allow remote attackers to cause a denial of service (application crash), or have other unknown impact, via (1) a long Location field sent by a web server, which triggers an overflow in the reconnect function in reader/http/http.c; (2) a long URL sent by a web server when AlsaPlayer is seeking a media file for the playlist, which triggers overflows in new_list_item and CbUpdated in interface/gtk/PlaylistWindow.cpp; and (3) a long response sent by a CDDB server, which triggers an overflow in cddb_lookup in input/ccda/cdda_engine.c.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:andy_lo-a-foe:alsaplayer:*:*:*:*:*:*:*:* | 0.99.76 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aluigi.altervista.org/adv/alsapbof-adv.txt
- http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0249.html
- http://secunia.com/advisories/21422
- http://secunia.com/advisories/21639
- http://secunia.com/advisories/21749
- http://secunia.com/advisories/22018
- http://security.gentoo.org/glsa/glsa-200608-24.xml
- http://securityreason.com/securityalert/1356
- http://www.debian.org/security/2006/dsa-1179
- http://www.novell.com/linux/security/advisories/2006_21_sr.html
- http://www.osvdb.org/27883
- http://www.osvdb.org/27884
- http://www.osvdb.org/27885
- http://www.securityfocus.com/archive/1/442725/100/0/threaded
- http://www.securityfocus.com/bid/19450
- http://www.vupen.com/english/advisories/2006/3235
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28306
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28307
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28308
- http://aluigi.altervista.org/adv/alsapbof-adv.txt
- http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0249.html
- http://secunia.com/advisories/21422
- http://secunia.com/advisories/21639
- http://secunia.com/advisories/21749
- http://secunia.com/advisories/22018
- http://security.gentoo.org/glsa/glsa-200608-24.xml
- http://securityreason.com/securityalert/1356
- http://www.debian.org/security/2006/dsa-1179
- http://www.novell.com/linux/security/advisories/2006_21_sr.html
- http://www.osvdb.org/27883
- http://www.osvdb.org/27884
- http://www.osvdb.org/27885
- http://www.securityfocus.com/archive/1/442725/100/0/threaded
- http://www.securityfocus.com/bid/19450
- http://www.vupen.com/english/advisories/2006/3235
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28306
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28307
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28308



