Unrated severityNVD Advisory· Published Aug 14, 2006· Updated Apr 16, 2026
CVE-2006-4125
CVE-2006-4125
Description
Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
Affected products
3cpe:2.3:a:dconnect:dconnect_daemon:0.0.2:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:dconnect:dconnect_daemon:0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:dconnect:dconnect_daemon:0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:dconnect:dconnect_daemon:0.7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.dc.ds.pg.gda.plnvdPatch
- secunia.com/advisories/21384nvdExploitVendor Advisory
- securitytracker.com/idnvdExploit
- www.securityfocus.com/bid/19369nvdExploitPatch
- securityreason.com/securityalert/1377nvd
- www.dc.ds.pg.gda.plnvd
- www.securityfocus.com/archive/1/442440/100/0/threadednvd
- www.vupen.com/english/advisories/2006/3181nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/28276nvd
News mentions
0No linked articles in our index yet.