Vulnerability Description
Jelsoft vBulletin 3.5.4 allows remote attackers to register multiple arbitrary users and cause a denial of service (resource consumption) via a large number of requests to register.php. NOTE: the vendor has disputed this vulnerability, stating "If you have the CAPTCHA enabled then the registrations wont even go through. ... if you are talking about the flood being allowed in the first place then surely this is something that should be handled at the server level.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jelsoft | Vbulletin | 3.5.4 |
References
- http://archives.neohapsis.com/archives/bugtraq/2006-08/0381.html
- http://securityreason.com/securityalert/1426
- http://www.securityfocus.com/archive/1/443648/100/0/threaded
- http://archives.neohapsis.com/archives/bugtraq/2006-08/0381.html
- http://securityreason.com/securityalert/1426
- http://www.securityfocus.com/archive/1/443648/100/0/threaded
FAQ
What is CVE-2006-4272?
CVE-2006-4272 is a vulnerability with a CVSS score of 7.5 (HIGH). Jelsoft vBulletin 3.5.4 allows remote attackers to register multiple arbitrary users and cause a denial of service (resource consumption) via a large number of requests to register.php. NOTE: the ven...
How severe is CVE-2006-4272?
CVE-2006-4272 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4272?
Check the references section above for vendor advisories and patch information. Affected products include: Jelsoft Vbulletin.