Vulnerability Description
Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote attackers to execute arbitrary code via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Linux Desktop | 9 |
| Novell | Open Enterprise Server | 1 |
References
- http://secunia.com/advisories/18995
- http://www.novell.com/linux/security/advisories/2006_10_casa.html
- http://www.securityfocus.com/bid/16779
- http://www.vupen.com/english/advisories/2006/0693
- http://secunia.com/advisories/18995
- http://www.novell.com/linux/security/advisories/2006_10_casa.html
- http://www.securityfocus.com/bid/16779
- http://www.vupen.com/english/advisories/2006/0693
FAQ
What is CVE-2006-0736?
CVE-2006-0736 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote attackers to execute arbitrary code via unspecified...
How severe is CVE-2006-0736?
CVE-2006-0736 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0736?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Linux Desktop, Novell Open Enterprise Server.