CVE-2006-1150 Affecting teg package, versions <0.11.1-3


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
6.64% (94th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-TEG-270392
  • published10 Mar 2006
  • disclosed10 Mar 2006

Introduced: 10 Mar 2006

CVE-2006-1150  (opens in a new tab)

How to fix?

Upgrade Debian:unstable teg to version 0.11.1-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream teg package and not the teg package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Buffer overflow in Tenes Empanadas Graciela (TEG) 0.11.1, automatically appends an _ (underscore) to the end of duplicate nicknames, which allows remote attackers to cause a denial of service (application crash) by creating multiple users with long, identical nicknames, which triggers an off-by-one error.

CVSS Scores

version 3.1