CVE-2006-6493 : Detail

CVE-2006-6493

8.43%V4
Network
2006-12-12
23h00 +00:00
2006-12-16
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2933

Publication date : 2006-12-14 23h00 +00:00
Author : Solar Eclipse
EDB Verified : Yes

Products Mentioned

Configuraton 0

Openldap>>Openldap >> Version To (including) 2.4.3

Openldap>>Openldap >> Version 1.0

Openldap>>Openldap >> Version 1.0.1

Openldap>>Openldap >> Version 1.0.2

Openldap>>Openldap >> Version 1.0.3

Openldap>>Openldap >> Version 1.1

Openldap>>Openldap >> Version 1.1.0

Openldap>>Openldap >> Version 1.1.1

Openldap>>Openldap >> Version 1.1.2

Openldap>>Openldap >> Version 1.1.3

Openldap>>Openldap >> Version 1.1.4

Openldap>>Openldap >> Version 1.2

Openldap>>Openldap >> Version 1.2.0

Openldap>>Openldap >> Version 1.2.1

Openldap>>Openldap >> Version 1.2.2

Openldap>>Openldap >> Version 1.2.3

Openldap>>Openldap >> Version 1.2.4

Openldap>>Openldap >> Version 1.2.5

Openldap>>Openldap >> Version 1.2.6

Openldap>>Openldap >> Version 1.2.7

Openldap>>Openldap >> Version 1.2.8

Openldap>>Openldap >> Version 1.2.9

Openldap>>Openldap >> Version 1.2.10

Openldap>>Openldap >> Version 1.2.11

Openldap>>Openldap >> Version 1.2.12

Openldap>>Openldap >> Version 1.2.13

Openldap>>Openldap >> Version 2.0

Openldap>>Openldap >> Version 2.0.0

Openldap>>Openldap >> Version 2.0.1

Openldap>>Openldap >> Version 2.0.2

Openldap>>Openldap >> Version 2.0.3

Openldap>>Openldap >> Version 2.0.4

Openldap>>Openldap >> Version 2.0.5

Openldap>>Openldap >> Version 2.0.6

Openldap>>Openldap >> Version 2.0.7

Openldap>>Openldap >> Version 2.0.8

Openldap>>Openldap >> Version 2.0.9

Openldap>>Openldap >> Version 2.0.10

Openldap>>Openldap >> Version 2.0.11

Openldap>>Openldap >> Version 2.0.11_9

Openldap>>Openldap >> Version 2.0.11_11

Openldap>>Openldap >> Version 2.0.11_11s

Openldap>>Openldap >> Version 2.0.12

Openldap>>Openldap >> Version 2.0.13

Openldap>>Openldap >> Version 2.0.14

Openldap>>Openldap >> Version 2.0.15

Openldap>>Openldap >> Version 2.0.16

Openldap>>Openldap >> Version 2.0.17

Openldap>>Openldap >> Version 2.0.18

Openldap>>Openldap >> Version 2.0.19

Openldap>>Openldap >> Version 2.0.20

Openldap>>Openldap >> Version 2.0.21

Openldap>>Openldap >> Version 2.0.22

Openldap>>Openldap >> Version 2.0.23

Openldap>>Openldap >> Version 2.0.24

Openldap>>Openldap >> Version 2.0.25

Openldap>>Openldap >> Version 2.0.26

Openldap>>Openldap >> Version 2.0.27

Openldap>>Openldap >> Version 2.1.2

Openldap>>Openldap >> Version 2.1.3

Openldap>>Openldap >> Version 2.1.4

Openldap>>Openldap >> Version 2.1.5

Openldap>>Openldap >> Version 2.1.6

Openldap>>Openldap >> Version 2.1.7

Openldap>>Openldap >> Version 2.1.8

Openldap>>Openldap >> Version 2.1.9

Openldap>>Openldap >> Version 2.1.10

Openldap>>Openldap >> Version 2.1.11

Openldap>>Openldap >> Version 2.1.12

Openldap>>Openldap >> Version 2.1.13

Openldap>>Openldap >> Version 2.1.14

Openldap>>Openldap >> Version 2.1.15

Openldap>>Openldap >> Version 2.1.16

Openldap>>Openldap >> Version 2.1.17

Openldap>>Openldap >> Version 2.1.18

Openldap>>Openldap >> Version 2.1.19

Openldap>>Openldap >> Version 2.1.20

Openldap>>Openldap >> Version 2.1.21

Openldap>>Openldap >> Version 2.1.22

Openldap>>Openldap >> Version 2.1.23

Openldap>>Openldap >> Version 2.1.24

Openldap>>Openldap >> Version 2.1.25

Openldap>>Openldap >> Version 2.1.26

Openldap>>Openldap >> Version 2.1.27

Openldap>>Openldap >> Version 2.1.28

Openldap>>Openldap >> Version 2.1.29

Openldap>>Openldap >> Version 2.1.30

Openldap>>Openldap >> Version 2.1_.20

Openldap>>Openldap >> Version 2.2.0

Openldap>>Openldap >> Version 2.2.1

Openldap>>Openldap >> Version 2.2.4

Openldap>>Openldap >> Version 2.2.5

Openldap>>Openldap >> Version 2.2.6

Openldap>>Openldap >> Version 2.2.7

Openldap>>Openldap >> Version 2.2.8

Openldap>>Openldap >> Version 2.2.9

Openldap>>Openldap >> Version 2.2.10

Openldap>>Openldap >> Version 2.2.11

Openldap>>Openldap >> Version 2.2.12

Openldap>>Openldap >> Version 2.2.13

Openldap>>Openldap >> Version 2.2.14

Openldap>>Openldap >> Version 2.2.15

Openldap>>Openldap >> Version 2.2.16

Openldap>>Openldap >> Version 2.2.17

Openldap>>Openldap >> Version 2.2.18

Openldap>>Openldap >> Version 2.2.19

Openldap>>Openldap >> Version 2.2.20

Openldap>>Openldap >> Version 2.2.21

Openldap>>Openldap >> Version 2.2.22

Openldap>>Openldap >> Version 2.2.23

Openldap>>Openldap >> Version 2.2.24

Openldap>>Openldap >> Version 2.2.25

Openldap>>Openldap >> Version 2.2.26

Openldap>>Openldap >> Version 2.2.27

Openldap>>Openldap >> Version 2.2.28_r2

Openldap>>Openldap >> Version 2.3.27_2_2006-10-18

Openldap>>Openldap >> Version 2.3.28_2_2006-10-22

Openldap>>Openldap >> Version 2.3.28_2006-10-22

Openldap>>Openldap >> Version 2.3.28_e1.0.0

References

http://www.securityfocus.com/archive/1/454181/30/0/threaded
Tags : mailing-list, x_refsource_BUGTRAQ
http://securityreason.com/securityalert/2023
Tags : third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/23334
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4964
Tags : vdb-entry, x_refsource_VUPEN