CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
84.3%
Buffer overflow in elogd.c in elog before 2.5.7 r1558-4 allows attackers to execute code via unspecified variables, when writing to the log file.
Vendor | Product | Version | CPE |
---|---|---|---|
stefan_ritt | elog_web_logbook | 2.0.0 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.1 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.2 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.3 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.4 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.0.5 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.0 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.1 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.2 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:* |
stefan_ritt | elog_web_logbook | 2.1.3 | cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi/0002-r1335-Applied-patch-from-Emiliano-to-fix-possible-buffer-overflow.txt?bug=349528%3Bmsg=15%3Batt=2
bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528
secunia.com/advisories/18783
www.debian.org/security/2006/dsa-967
www.securityfocus.com/bid/16579
exchange.xforce.ibmcloud.com/vulnerabilities/24705