Description
Array index error in tetrinet.c in gtetrinet 0.7.8 and earlier allows remote attackers to execute arbitrary code via a packet specifying a negative number of players, which is used as an array index.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
security@debian.org
http://secunia.com/advisories/21691security@debian.org
http://secunia.com/advisories/21704security@debian.org
http://secunia.com/advisories/21749security@debian.org
http://secunia.com/advisories/21800security@debian.org
http://security.gentoo.org/glsa/glsa-200609-02.xmlsecurity@debian.org
http://www.debian.org/security/2006/dsa-1163security@debian.org
http://www.novell.com/linux/security/advisories/2006_21_sr.htmlsecurity@debian.org
http://www.osvdb.org/28269security@debian.org
http://www.securityfocus.com/bid/19766security@debian.org
https://exchange.xforce.ibmcloud.com/vulnerabilities/28683af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21691af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21704af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21749af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21800af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200609-02.xmlaf854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1163af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_21_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/28269af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19766af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/28683