Vulnerability Description
Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chetcpasswd | Chetcpasswd | 2.3.3 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454Patch
- http://marc.info/?l=bugtraq&m=116371297325564&w=2Mailing List
- http://secunia.com/advisories/22967Vendor Advisory
- http://www.securityfocus.com/bid/21102Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30455
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454Patch
- http://marc.info/?l=bugtraq&m=116371297325564&w=2Mailing List
- http://secunia.com/advisories/22967Vendor Advisory
- http://www.securityfocus.com/bid/21102Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30455
FAQ
What is CVE-2006-6681?
CVE-2006-6681 is a vulnerability with a CVSS score of 7.5 (HIGH). Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.
How severe is CVE-2006-6681?
CVE-2006-6681 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6681?
Check the references section above for vendor advisories and patch information. Affected products include: Chetcpasswd Chetcpasswd.