{"id":"CVE-2006-3125","details":"Array index error in tetrinet.c in gtetrinet 0.7.8 and earlier allows remote attackers to execute arbitrary code via a packet specifying a negative number of players, which is used as an array index.","modified":"2026-04-10T03:38:29.274243Z","published":"2006-08-31T21:04:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/21691"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21704"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21749"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21800"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_21_sr.html"},{"type":"FIX","url":"http://secunia.com/advisories/21704"},{"type":"FIX","url":"http://secunia.com/advisories/21800"},{"type":"FIX","url":"http://security.gentoo.org/glsa/glsa-200609-02.xml"},{"type":"FIX","url":"http://www.debian.org/security/2006/dsa-1163"},{"type":"WEB","url":"http://www.osvdb.org/28269"},{"type":"WEB","url":"http://www.securityfocus.com/bid/19766"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28683"}],"schema_version":"1.7.5"}