Vulnerability Description
libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Double Precision Incorporated | Courier Mta | <= 0.44.2 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834Patch
- http://secunia.com/advisories/20519
- http://secunia.com/advisories/20548
- http://secunia.com/advisories/20792
- http://secunia.com/advisories/21350
- http://security.gentoo.org/glsa/glsa-200608-06.xml
- http://securitytracker.com/id?1016248
- http://www.courier-mta.org/beta/patches/verp-fix/README.txtPatch
- http://www.debian.org/security/2006/dsa-1101
- http://www.securityfocus.com/bid/18345
- http://www.vupen.com/english/advisories/2006/2214
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26998
- https://usn.ubuntu.com/294-1/
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834Patch
- http://secunia.com/advisories/20519
FAQ
What is CVE-2006-2659?
CVE-2006-2659 is a vulnerability with a CVSS score of 7.8 (HIGH). libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is no...
How severe is CVE-2006-2659?
CVE-2006-2659 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2659?
Check the references section above for vendor advisories and patch information. Affected products include: Double Precision Incorporated Courier Mta.