CVE-2006-0048
Publication date 26 April 2006
Last updated 24 July 2024
Ubuntu priority
Francesco Stablum tcpick 0.2.1 allows remote attackers to cause a denial of service (segmentation fault) via certain fragmented packets, possibly involving invalid headers and an attacker-controlled payload length. NOTE: this issue might be a buffer overflow or overread.
Status
Package | Ubuntu Release | Status |
---|---|---|
tcpick | 7.04 feisty |
Fixed 0.2.1-3
|
6.10 edgy |
Fixed 0.2.1-3
|
|
6.06 LTS dapper |
Fixed 0.2.1-3
|