Vulnerability Name: | CVE-2006-0599 (CCN-19323) | ||||||||
Assigned: | 2005-02-15 | ||||||||
Published: | 2005-02-15 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | The (1) elog.c and (2) elogd.c components in elog before 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MISC Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3 Source: MISC Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528 Source: MITRE Type: CNA CVE-2005-0440 Source: MITRE Type: CNA CVE-2006-0599 Source: CCN Type: ELOG download page ELOG download page Source: SECUNIA Type: Patch, Vendor Advisory 18783 Source: DEBIAN Type: Patch, Vendor Advisory DSA-967 Source: DEBIAN Type: DSA-967 elog -- several vulnerabilities Source: CCN Type: OSVDB ID: 13813 ELOG Traversal Arbitrary File Access Source: CCN Type: BID-12556 ELOG Web Logbook Multiple Remote Vulnerabilities Source: BID Type: UNKNOWN 16579 Source: CCN Type: BID-16579 ELOG Web Logbook Multiple Remote Vulnerabilities Source: XF Type: UNKNOWN elog-password-information-disclosure(19323) Source: XF Type: UNKNOWN elog-elog-elogd-user-enumeration(24706) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2006-0599 (CCN-24706) | ||||||||
Assigned: | 2006-02-10 | ||||||||
Published: | 2006-02-10 | ||||||||
Updated: | 2006-02-10 | ||||||||
Summary: | ELOG could allow a remote attacker to obtain sensitive information. The elog.c and elogd.c components display a different response if a username is valid. A remote attacker could use this to determine valid usernames, which could be used to launch further attacks against the affected system. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-0599 Source: CCN Type: ELOG download page ELOG download page Source: DEBIAN Type: DSA-967 elog -- several vulnerabilities Source: CCN Type: BID-16579 ELOG Web Logbook Multiple Remote Vulnerabilities Source: XF Type: UNKNOWN elog-elog-elogd-user-enumeration(24706) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |