Show plain JSON{"id": "CVE-2006-5601", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-10-28T01:07:00.000", "references": [{"url": "http://open1x.cvs.sourceforge.net/open1x/xsupplicant/src/eap.c?r1=1.135&r2=1.136", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/22612", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/22641", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:189", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2007_01_sr.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/20775", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/4233", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29902", "source": "cve@mitre.org"}, {"url": "http://open1x.cvs.sourceforge.net/open1x/xsupplicant/src/eap.c?r1=1.135&r2=1.136", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/22612", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/22641", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:189", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.novell.com/linux/security/advisories/2007_01_sr.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/20775", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/4233", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29902", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila la funci\u00f3n eap_do_notify en eap.c en xsupplicant anterior a la versi\u00f3n 1.2.6. y, posiblemente, otras versiones, permite a usuarios remotos autenticados, la ejecuci\u00f3n de c\u00f3digo arbitrario de su elecci\u00f3n a trav\u00e9s de vectores sin especificar."}], "lastModified": "2024-11-21T00:19:51.633", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6020906D-C769-4B13-BEE2-E80A3768F062", "versionEndIncluding": "1.2.5"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91577B2B-003B-4B7D-A0DF-6D9B09964793"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0958592C-441E-40D7-A944-68A1777042AD"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6147D5B-2628-4C75-B7F0-3BA4546C7F78"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5541BD6-DC5A-4A11-A65F-95689BD85C1C"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:0.8b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1378B5A9-A81D-48C7-A515-49DD5E56FDB8"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A66D7E3-A179-4F14-99C0-B9857BD92C95"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "237E427F-722F-496D-A8DE-D239987FD8E4"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.0pre1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A36D0B9C-A22E-4B66-B044-D7EC2E5C77D8"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.0pre2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "551BD262-B12C-4648-9780-6D538312C167"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8037E1C6-5CBA-41EE-A738-EBA32CC19576"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "206C8E85-FE93-494B-A3CF-B77FD39D86B4"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D29608A2-7F8F-4587-85BB-A2CCD7A3480F"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D05DDA25-5BB7-44FB-A466-624DBFC96248"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A797F76B-9C79-46C3-A6F5-77FB5158CFC9"}, {"criteria": "cpe:2.3:a:xsupplicant:xsupplicant:1.2pre1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6A5B89E-2996-4BA9-9F66-1B057AE6A9EA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}