Lucene search

K
cveMitreCVE-2006-6318
HistoryDec 28, 2006 - 8:28 p.m.

CVE-2006-6318

2006-12-2820:28:00
mitre
web.nvd.nist.gov
32
cve-2006-6318
elog
elogd.c
denial of service
daemon crash

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

6

Confidence

Low

EPSS

0.063

Percentile

93.6%

The show_elog_list function in elogd.c in elog 2.6.2 and earlier allows remote authenticated users to cause a denial of service (daemon crash) by attempting to access a logbook whose name begins with “global,” which results in a NULL pointer dereference. NOTE: some of these details are obtained from third party information.

Affected configurations

Nvd
Node
stefan_rittelog_web_logbookRange2.6.2
OR
stefan_rittelog_web_logbookMatch2.0.0
OR
stefan_rittelog_web_logbookMatch2.0.1
OR
stefan_rittelog_web_logbookMatch2.0.2
OR
stefan_rittelog_web_logbookMatch2.0.3
OR
stefan_rittelog_web_logbookMatch2.0.4
OR
stefan_rittelog_web_logbookMatch2.0.5
OR
stefan_rittelog_web_logbookMatch2.1.0
OR
stefan_rittelog_web_logbookMatch2.1.1
OR
stefan_rittelog_web_logbookMatch2.1.2
OR
stefan_rittelog_web_logbookMatch2.1.3
OR
stefan_rittelog_web_logbookMatch2.2.0
OR
stefan_rittelog_web_logbookMatch2.2.1
OR
stefan_rittelog_web_logbookMatch2.2.2
OR
stefan_rittelog_web_logbookMatch2.2.3
OR
stefan_rittelog_web_logbookMatch2.2.4
OR
stefan_rittelog_web_logbookMatch2.4
OR
stefan_rittelog_web_logbookMatch2.5
OR
stefan_rittelog_web_logbookMatch2.5.6
OR
stefan_rittelog_web_logbookMatch2.5.7
OR
stefan_rittelog_web_logbookMatch2.6.0
OR
stefan_rittelog_web_logbookMatch2.6.1
VendorProductVersionCPE
stefan_rittelog_web_logbook*cpe:2.3:a:stefan_ritt:elog_web_logbook:*:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.0.0cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.0.1cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.0.2cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.0.3cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.0.4cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.0.5cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.1.0cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.1.1cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*
stefan_rittelog_web_logbook2.1.2cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 221

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

6

Confidence

Low

EPSS

0.063

Percentile

93.6%