ID CVE-2006-2754
Summary Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
References
Vulnerable Configurations
  • cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:41)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bugtraq 20060609 rPSA-2006-0099-1 openldap openldap-clients openldap-servers
confirm
gentoo GLSA-200606-17
mandriva MDKSA-2006:096
openpkg OpenPKG-SA-2006.008
osvdb 25659
secunia
  • 20126
  • 20495
  • 20685
  • 20848
ubuntu USN-305-1
vupen ADV-2006-1921
statements via4
contributor Mark J Cox
lastmodified 2006-08-16
organization Red Hat
statement This issue is not exploitable as the status file is only written to and read by the slurpd process. Therefore this is not a vulnerability that affects Red Hat Enterprise Linux 2.1, 3, or 4.
Last major update 18-10-2018 - 16:41
Published 01-06-2006 - 17:02
Back to Top