René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

228 lines
8.2 KiB
JSON

{
"id": "CVE-2006-6318",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-12-28T20:28:00.000",
"lastModified": "2011-03-08T02:45:46.250",
"vulnStatus": "Modified",
"evaluatorSolution": "Successful exploitation requires authentication only if the application is configured with a password. It is not, by default.",
"descriptions": [
{
"lang": "en",
"value": "The show_elog_list function in elogd.c in elog 2.6.2 and earlier allows remote authenticated users to cause a denial of service (daemon crash) by attempting to access a logbook whose name begins with \"global,\" which results in a NULL pointer dereference. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "La funci\u00f3n show_elog_list en elogd.c de elog 2.6.2 y anteriores permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) mediante un intento de acceder al libro de registro cuyo nombre empieza con \"global\", lo cual resulta en una referencia a puntero nulo (NULL dereference). NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.2",
"matchCriteriaId": "72D613D0-64FD-4590-8087-C0A834C65586"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF27C7ED-98A3-48A3-9DE0-376CB0FAFAE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "699E4BEE-A5B1-474C-892A-08680690E784"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9266F578-79ED-48F9-A686-BBBBDF1CCB61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF1F9C8-AC49-42E6-BAE3-9FC4BF1512C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B1671B86-B1DC-49DC-9AE1-883EF3DF7E3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "74589737-6A1F-4F63-8330-CE1374A7F3BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52BE6CD0-2901-44EC-A065-EDA5FF4831E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30AC1C1A-DEC0-45DA-B09A-B029426732A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8EF8B8DF-A162-4603-B6BA-A1CC5D34AF56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3E19C713-B881-4CC9-AB40-A5B12B7D14BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E77FC6F-10A7-489B-8644-FBFA8C9E5326"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC97CEC-AF5B-4A69-928A-E1FFB9180CA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "44B9943E-81C9-43A4-A5E2-9BDD62456EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BB784D24-C980-4030-9E0E-9F7AE3FFD429"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FA8B3C4C-BB31-43E1-A8F3-49A204AE6709"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "158E603A-4C79-4C29-85CE-0BEBB485F287"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33629F82-9C9A-44C4-85A9-6B61F8760767"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BE4E89CC-9CF3-4DC2-9829-3C215DC0C1D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D34F0566-DCF7-4CAA-980A-78B989CC5C41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F69F7E5-0EAA-48F5-A358-F42576776745"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_ritt:elog_web_logbook:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA669F5E-B250-4467-B09D-F0ACCB5ED81F"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0198.html",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=397875",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://securityreason.com/securityalert/2060",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1017450",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2006/dsa-1242",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/451351",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/21028",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4423",
"source": "cve@mitre.org"
}
]
}