ID |
CVE-2006-2754
|
Summary |
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
-
cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 18-10-2018 - 16:41) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bugtraq | 20060609 rPSA-2006-0099-1 openldap openldap-clients openldap-servers | confirm | | gentoo | GLSA-200606-17 | mandriva | MDKSA-2006:096 | openpkg | OpenPKG-SA-2006.008 | osvdb | 25659 | secunia | | ubuntu | USN-305-1 | vupen | ADV-2006-1921 |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2006-08-16 | organization | Red Hat | statement | This issue is not exploitable as the status file is only written to and read by the slurpd process. Therefore this is not a vulnerability that affects Red Hat Enterprise Linux 2.1, 3, or 4.
|
|
Last major update |
18-10-2018 - 16:41 |
Published |
01-06-2006 - 17:02 |
Last modified |
18-10-2018 - 16:41 |