CVE-2006-6684

Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd before 2.4 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long X-Forwarded-For HTTP header. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pedro_lineu_orso:chetcpasswd:*:*:*:*:*:*:*:*
cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 - Vendor Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 - Vendor Advisory
References () http://secunia.com/advisories/22967 - Vendor Advisory () http://secunia.com/advisories/22967 - Vendor Advisory
References () http://www.osvdb.org/30546 - Vendor Advisory () http://www.osvdb.org/30546 - Vendor Advisory

Information

Published : 2006-12-21 19:28

Updated : 2025-04-09 00:30


NVD link : CVE-2006-6684

Mitre link : CVE-2006-6684

CVE.ORG link : CVE-2006-6684


JSON object : View

Products Affected

pedro_lineu_orso

  • chetcpasswd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer