CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
83.9%
Multiple stack-based buffer overflows in elogd.c in elog before 2.5.7 r1558-4 allow attackers to cause a denial of service (application crash) and possibly execute code via long “revision attributes”.
Vendor | Product | Version | CPE |
---|---|---|---|
stefan_ritt | elog_web_logbook | 2.0.0 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.1 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.2 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.3 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.4 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.5 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.0 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.1 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.2 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.3 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi/0001-r1333-Fixed-crashes-with-very-long-revisions-attributes.txt?bug=349528%3Bmsg=15%3Batt=1
bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528
secunia.com/advisories/18783
www.debian.org/security/2006/dsa-967
www.securityfocus.com/bid/16579
exchange.xforce.ibmcloud.com/vulnerabilities/24704