CVE-2006-2346
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/05/2006
Last modified:
03/04/2025
Description
vpopmail 5.4.14 and 5.4.15, with cleartext passwords enabled, allows remote attackers to authenticate to an account that does not have a cleartext password set by using a blank password to (1) SMTP AUTH or (2) APOP.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:inter7:vpopmail_\(vchkpw\):5.4.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:inter7:vpopmail_\(vchkpw\):5.4.15:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/19987
- http://sourceforge.net/project/shownotes.php?release_id=415350
- http://www.osvdb.org/25445
- http://www.securityfocus.com/bid/17894
- http://www.vupen.com/english/advisories/2006/1698
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26333
- http://secunia.com/advisories/19987
- http://sourceforge.net/project/shownotes.php?release_id=415350
- http://www.osvdb.org/25445
- http://www.securityfocus.com/bid/17894
- http://www.vupen.com/english/advisories/2006/1698
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26333