fkie_cve-2006-5708
Vulnerability from fkie_nvd
Published
2006-11-04 01:07
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| alt-n | mdaemon | * | |
| alt-n | mdaemon | 2.8 | |
| alt-n | mdaemon | 2.8.5.0 | |
| alt-n | mdaemon | 2.71_sp1 | |
| alt-n | mdaemon | 3.0.3 | |
| alt-n | mdaemon | 3.0.4 | |
| alt-n | mdaemon | 3.1.1 | |
| alt-n | mdaemon | 3.1.2 | |
| alt-n | mdaemon | 3.1_beta | |
| alt-n | mdaemon | 3.5.0 | |
| alt-n | mdaemon | 3.5.1 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.6 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0.1 | |
| alt-n | mdaemon | 5.0.2 | |
| alt-n | mdaemon | 5.0.3 | |
| alt-n | mdaemon | 5.0.4 | |
| alt-n | mdaemon | 5.0.5 | |
| alt-n | mdaemon | 5.0.6 | |
| alt-n | mdaemon | 5.0.7 | |
| alt-n | mdaemon | 6.0 | |
| alt-n | mdaemon | 6.0.5 | |
| alt-n | mdaemon | 6.0.6 | |
| alt-n | mdaemon | 6.0.7 | |
| alt-n | mdaemon | 6.5.0 | |
| alt-n | mdaemon | 6.5.1 | |
| alt-n | mdaemon | 6.5.2 | |
| alt-n | mdaemon | 6.7.5 | |
| alt-n | mdaemon | 6.7.9 | |
| alt-n | mdaemon | 6.8.0 | |
| alt-n | mdaemon | 6.8.1 | |
| alt-n | mdaemon | 6.8.2 | |
| alt-n | mdaemon | 6.8.3 | |
| alt-n | mdaemon | 6.8.4 | |
| alt-n | mdaemon | 6.8.5 | |
| alt-n | mdaemon | 7.2 | |
| alt-n | mdaemon | 8.1.1 | |
| alt-n | mdaemon | 8.1.3 | |
| alt-n | mdaemon | 8.1.4 | |
| alt-n | mdaemon | 9.0.1 | |
| alt-n | mdaemon | 9.0.2 | |
| alt-n | mdaemon | 9.0.3 | |
| alt-n | mdaemon | 9.0.4 | |
| alt-n | mdaemon | 9.0.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "050AC344-C537-473A-B1C7-286C4DFCC34A",
"versionEndIncluding": "9.50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
"matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegaci\u00f3n de servicio (cosumo de memoria) a trav\u00e9s de vectores no especificados resultado de filtros de memoria."
}
],
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nAlt-N Technologies, MDaemon, 9.50",
"id": "CVE-2006-5708",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2006-11-04T01:07:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…