CVE-2006-6318

The show_elog_list function in elogd.c in elog 2.6.2 and earlier allows remote authenticated users to cause a denial of service (daemon crash) by attempting to access a logbook whose name begins with "global," which results in a NULL pointer dereference. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:stefan_ritt:elog_web_logbook:*:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.4:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.6.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0198.html - () http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0198.html -
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=397875 - Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=397875 - Patch
References () http://secunia.com/advisories/22800 - () http://secunia.com/advisories/22800 -
References () http://secunia.com/advisories/23580 - Patch, Vendor Advisory () http://secunia.com/advisories/23580 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/2060 - () http://securityreason.com/securityalert/2060 -
References () http://securitytracker.com/id?1017450 - () http://securitytracker.com/id?1017450 -
References () http://www.debian.org/security/2006/dsa-1242 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1242 - Patch, Vendor Advisory
References () http://www.osvdb.org/30272 - () http://www.osvdb.org/30272 -
References () http://www.securityfocus.com/archive/1/451351 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/451351 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/21028 - Patch () http://www.securityfocus.com/bid/21028 - Patch
References () http://www.vupen.com/english/advisories/2006/4423 - () http://www.vupen.com/english/advisories/2006/4423 -

Information

Published : 2006-12-28 20:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6318

Mitre link : CVE-2006-6318

CVE.ORG link : CVE-2006-6318


JSON object : View

Products Affected

stefan_ritt

  • elog_web_logbook