CVE-2006-4127

N/A Unknown
Published: August 14, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple format string vulnerabilities in DConnect Daemon 0.7.0 and earlier allow remote administrators to execute arbitrary code via format string specifiers that are not properly handled when calling the (1) privmsg() or (2) pubmsg functions from (a) cmd.user.c, (b) penalties.c, or (c) cmd.dc.c.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/21384
Source: cve@mitre.org
Vendor Advisory
http://securitytracker.com/id?1016641
Source: cve@mitre.org
Exploit
http://www.dc.ds.pg.gda.pl/
Source: cve@mitre.org
Patch
http://www.securityfocus.com/bid/19371
Source: cve@mitre.org
Exploit Patch
http://secunia.com/advisories/21384
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/1377
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016641
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.dc.ds.pg.gda.pl/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/442440/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19371
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.vupen.com/english/advisories/2006/3181
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/28280
Source: af854a3a-2127-422b-91ae-364da2661108

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.6%
82th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

dconnect