Vulnerability Description
Multiple stack-based buffer overflows in elogd.c in elog before 2.5.7 r1558-4 allow attackers to cause a denial of service (application crash) and possibly execute code via long "revision attributes".
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stefan Ritt | Elog Web Logbook | 2.0.0 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi/0001-r1333-Fixed-crashes-with-very-
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528
- http://secunia.com/advisories/18783PatchVendor Advisory
- http://www.debian.org/security/2006/dsa-967PatchVendor Advisory
- http://www.securityfocus.com/bid/16579
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24704
- http://bugs.debian.org/cgi-bin/bugreport.cgi/0001-r1333-Fixed-crashes-with-very-
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528
- http://secunia.com/advisories/18783PatchVendor Advisory
- http://www.debian.org/security/2006/dsa-967PatchVendor Advisory
- http://www.securityfocus.com/bid/16579
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24704
FAQ
What is CVE-2006-0597?
CVE-2006-0597 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple stack-based buffer overflows in elogd.c in elog before 2.5.7 r1558-4 allow attackers to cause a denial of service (application crash) and possibly execute code via long "revision attributes".
How severe is CVE-2006-0597?
CVE-2006-0597 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0597?
Check the references section above for vendor advisories and patch information. Affected products include: Stefan Ritt Elog Web Logbook.