CVE-2006-2754
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/06/2006
Last modified:
03/04/2025
Description
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/20126
- http://secunia.com/advisories/20495
- http://secunia.com/advisories/20685
- http://secunia.com/advisories/20848
- http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A096
- http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=h
- http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22
- http://www.openldap.org/software/release/changes.html
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html
- http://www.osvdb.org/25659
- http://www.securityfocus.com/archive/1/436674/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1921
- https://usn.ubuntu.com/305-1/
- http://secunia.com/advisories/20126
- http://secunia.com/advisories/20495
- http://secunia.com/advisories/20685
- http://secunia.com/advisories/20848
- http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A096
- http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=h
- http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22
- http://www.openldap.org/software/release/changes.html
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html
- http://www.osvdb.org/25659
- http://www.securityfocus.com/archive/1/436674/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1921
- https://usn.ubuntu.com/305-1/