Multiple format string vulnerabilities in elogd.c in ELOG 2.6.2 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) an entry with an attachment whose name contains format string specifiers (el_submit function), and possibly other vectors in the (2) receive_config, (3) show_rss_feed, (4) show_elog_list, (5) show_logbook_node, and (6) server_loop functions.
References
Configurations
History
21 Nov 2024, 00:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392016 - | |
References | () http://secunia.com/advisories/22638 - Vendor Advisory | |
References | () http://secunia.com/advisories/23580 - | |
References | () http://www.debian.org/security/2006/dsa-1242 - | |
References | () http://www.securityfocus.com/bid/20876 - | |
References | () http://www.vupen.com/english/advisories/2006/4315 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29987 - |
Information
Published : 2006-11-07 23:07
Updated : 2024-11-21 00:20
NVD link : CVE-2006-5790
Mitre link : CVE-2006-5790
CVE.ORG link : CVE-2006-5790
JSON object : View
Products Affected
stefan_ritt
- elog_web_logbook
CWE