{ "id": "CVE-2006-1253", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-19T01:02:00.000", "lastModified": "2024-11-21T00:08:25.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "4E50A926-D68F-4B1E-A009-0808611885B7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "93D1CB71-B47D-4683-8174-328676D31DC1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "91C1CCAA-543B-45EA-ABA1-768CEC9B7B84" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.23:*:*:*:*:*:*:*", "matchCriteriaId": "FE1E9A9B-BD3E-4D6B-87F5-1A84ACE32115" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.24:*:*:*:*:*:*:*", "matchCriteriaId": "81FD5F55-1937-4063-B534-B04AD0C4DE18" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.25:*:*:*:*:*:*:*", "matchCriteriaId": "E99FE53F-F64C-486C-B36F-A987A00F0BFA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "648069B8-DCAD-4E41-8721-64ED93CF5D4F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.27:*:*:*:*:*:*:*", "matchCriteriaId": "8BC92E29-F4C6-4529-B691-1B3C9621BECB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.28:*:*:*:*:*:*:*", "matchCriteriaId": "FA83D5D1-47A5-4173-9C03-3BBECB446CDD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.29:*:*:*:*:*:*:*", "matchCriteriaId": "B349E5EE-7190-4CC3-9015-10380DBC281F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6AE9464-A3D2-4CAE-90F2-E241FEE8D75F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "2AB9FE1C-742B-4EE5-93E1-FF74AF070E0D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.31:*:*:*:*:*:*:*", "matchCriteriaId": "B2CA4FD5-451F-4657-B494-F48DA6D933E7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "6C626C28-742B-4F6D-94E0-56B445260522" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5F0131D-0E50-433A-ABEB-3B0062BFDC9F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "11FFFE55-070E-45B1-889D-0F81EAA1E213" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "2931F258-AECE-4181-905A-D8801E12721B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "28D773FC-D4D3-495D-BDE0-155B896D1B7B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc4:*:*:*:*:*:*:*", "matchCriteriaId": "A0D405B1-8AF9-46A5-AFB0-628F067D8D73" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc5:*:*:*:*:*:*:*", "matchCriteriaId": "CAED5165-E96B-45BD-9C93-A365C6569E13" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc6:*:*:*:*:*:*:*", "matchCriteriaId": "8215195F-1FE1-4F3C-A067-E69F177E58B7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc7:*:*:*:*:*:*:*", "matchCriteriaId": "B05E032C-B32F-4AD6-B226-9E49CCD5D44F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "17585572-DF7D-44A6-87EE-2FE7760AEBE1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "FC5604AF-E077-4195-BF64-1855638C923F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "43D93E21-AC66-4D9C-9154-4698272F8268" }, { "vulnerable": true, "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc4:*:*:*:*:*:*:*", "matchCriteriaId": "0D17CAEF-2E71-4D51-8A92-500A3B147242" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/19221", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.glftpd.com/files/docs/changelog", "source": "cve@mitre.org", "tags": [ "URL Repurposed" ] }, { "url": "http://www.securityfocus.com/bid/17118", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/19221", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.glftpd.com/files/docs/changelog", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "URL Repurposed" ] }, { "url": "http://www.securityfocus.com/bid/17118", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }