Executive Summary

Informations
Name CVE-2006-0348 First vendor Publication 2006-01-20
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Format string vulnerability in the write_logfile function in ELOG before 2.6.1 allows remote attackers to cause a denial of service (server crash) via unknown attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0348

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 20

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 967-1 (elog)
File : nvt/deb_967_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
22646 ELOG Login Page write_logfile() Remote Format String

ELOG contains a format string error that may allow a malicious user to crash the service or potentially execute arbitrary code. The issue is triggered when a specially crafted username is submitted via the login page and then processed by the 'write_logfile' function in 'elogd.c'. It is possible that the flaw may result in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-967.nasl - Type : ACT_GATHER_INFO
2006-01-20 Name : The remote web server is affected by multiple flaws.
File : elog_261.nasl - Type : ACT_ATTACK

Sources (Detail)

http://midas.psi.ch/elog/download/ChangeLog
http://secunia.com/advisories/18533
http://secunia.com/advisories/18783
http://www.debian.org/security/2006/dsa-967
http://www.osvdb.org/22646
http://www.securityfocus.com/bid/16315
http://www.vupen.com/english/advisories/2006/0262
https://exchange.xforce.ibmcloud.com/vulnerabilities/24221
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:21:07
  • Multiple Updates
2024-11-28 12:08:15
  • Multiple Updates
2021-05-04 12:03:39
  • Multiple Updates
2021-04-22 01:04:08
  • Multiple Updates
2020-05-23 00:17:21
  • Multiple Updates
2017-07-20 09:23:19
  • Multiple Updates
2016-06-28 15:35:20
  • Multiple Updates
2016-04-26 14:14:27
  • Multiple Updates
2014-02-17 10:34:28
  • Multiple Updates
2013-05-11 10:47:58
  • Multiple Updates