CVE-2006-4046 Affecting ocp package, versions <0.1.10rc6-1


Severity

Recommended
medium

Based on Debian security rating.

Threat Intelligence

EPSS
39.42% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-OCP-528220
  • published9 Aug 2006
  • disclosed9 Aug 2006

Introduced: 9 Aug 2006

CVE-2006-4046  (opens in a new tab)

How to fix?

Upgrade Debian:11 ocp to version 0.1.10rc6-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ocp package and not the ocp package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Multiple stack-based buffer overflows in Open Cubic Player 2.6.0pre6 and earlier for Windows, and 0.1.10_rc5 and earlier on Linux/BSD, allow remote attackers to execute arbitrary code via (1) a large .S3M file handled by the mpLoadS3M function, (2) a crafted .IT file handled by the itplayerclass::module::load function, (3) a crafted .ULT file handled by the mpLoadULT function, or (4) a crafted .AMS file handled by the mpLoadAMS function.

CVSS Scores

version 3.1