Vulnerability Description
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
CVSS Score
5.0
MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openldap | Openldap | 2.2.1 |
References
- http://secunia.com/advisories/20126PatchVendor Advisory
- http://secunia.com/advisories/20495
- http://secunia.com/advisories/20685
- http://secunia.com/advisories/20848
- http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:096
- http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.2Patch
- http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydPatch
- http://www.openldap.org/software/release/changes.htmlPatch
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.htmlPatch
- http://www.osvdb.org/25659
- http://www.securityfocus.com/archive/1/436674/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1921
- https://usn.ubuntu.com/305-1/
- http://secunia.com/advisories/20126PatchVendor Advisory
FAQ
What is CVE-2006-2754?
CVE-2006-2754 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
How severe is CVE-2006-2754?
CVE-2006-2754 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2754?
Check the references section above for vendor advisories and patch information. Affected products include: Openldap Openldap.