CVE-2006-6713
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/12/2006
Last modified:
09/04/2025
Description
Buffer overflow in Hitachi Directory Server 2 P-2444-A124 before 02-11-/K on Windows, and P-1B44-A121 before 02-10-/V on HP-UX, allows remote attackers to execute arbitrary code via crafted LDAP requests.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_1b44_a121_02_00:*:hp_ux:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_1b44_a121_02_01:*:hp_ux:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_1b44_a121_02_10:*:hp_ux:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_1b44_a121_02_10_p:*:hp_ux:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_1b44_a121_02_10_q:*:hp_ux:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_1b44_a121_02_10_s:*:hp_ux:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_2444_a124_02_00:*:windows:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_2444_a124_02_01:*:windows:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_2444_a124_02_11:*:windows:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_2444_a124_02_11_f:*:windows:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_2444_a124_02_11_g:*:windows:*:*:*:*:* | ||
| cpe:2.3:a:hitachi:hitachi_directory_server_2:p_2444_a124_02_11_h:*:windows:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/23421
- http://www.hitachi-support.com/security_e/vuls_e/HS06-018_e/01-e.html
- http://www.securityfocus.com/bid/21692
- http://www.vupen.com/english/advisories/2006/5098
- http://secunia.com/advisories/23421
- http://www.hitachi-support.com/security_e/vuls_e/HS06-018_e/01-e.html
- http://www.securityfocus.com/bid/21692
- http://www.vupen.com/english/advisories/2006/5098



