Vulnerability Name:

CVE-2006-0599 (CCN-19323)

Assigned:2005-02-15
Published:2005-02-15
Updated:2017-07-20
Summary:The (1) elog.c and (2) elogd.c components in elog before 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: MISC
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3

Source: MISC
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528

Source: MITRE
Type: CNA
CVE-2005-0440

Source: MITRE
Type: CNA
CVE-2006-0599

Source: CCN
Type: ELOG download page
ELOG download page

Source: SECUNIA
Type: Patch, Vendor Advisory
18783

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-967

Source: DEBIAN
Type: DSA-967
elog -- several vulnerabilities

Source: CCN
Type: OSVDB ID: 13813
ELOG Traversal Arbitrary File Access

Source: CCN
Type: BID-12556
ELOG Web Logbook Multiple Remote Vulnerabilities

Source: BID
Type: UNKNOWN
16579

Source: CCN
Type: BID-16579
ELOG Web Logbook Multiple Remote Vulnerabilities

Source: XF
Type: UNKNOWN
elog-password-information-disclosure(19323)

Source: XF
Type: UNKNOWN
elog-elog-elogd-user-enumeration(24706)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-0599 (CCN-24706)

    Assigned:2006-02-10
    Published:2006-02-10
    Updated:2006-02-10
    Summary:ELOG could allow a remote attacker to obtain sensitive information. The elog.c and elogd.c components display a different response if a username is valid. A remote attacker could use this to determine valid usernames, which could be used to launch further attacks against the affected system.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): None
    Availibility (A): None
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
    4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
    4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Obtain Information
    References:Source: MITRE
    Type: CNA
    CVE-2006-0599

    Source: CCN
    Type: ELOG download page
    ELOG download page

    Source: DEBIAN
    Type: DSA-967
    elog -- several vulnerabilities

    Source: CCN
    Type: BID-16579
    ELOG Web Logbook Multiple Remote Vulnerabilities

    Source: XF
    Type: UNKNOWN
    elog-elog-elogd-user-enumeration(24706)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:967
    V
    several vulnerabilities
    2006-02-10
    BACK
    stefan_ritt elog web logbook 2.0.0
    stefan_ritt elog web logbook 2.0.1
    stefan_ritt elog web logbook 2.0.2
    stefan_ritt elog web logbook 2.0.3
    stefan_ritt elog web logbook 2.0.4
    stefan_ritt elog web logbook 2.0.5
    stefan_ritt elog web logbook 2.1.0
    stefan_ritt elog web logbook 2.1.1
    stefan_ritt elog web logbook 2.1.2
    stefan_ritt elog web logbook 2.1.3
    stefan_ritt elog web logbook 2.2.0
    stefan_ritt elog web logbook 2.2.1
    stefan_ritt elog web logbook 2.2.2
    stefan_ritt elog web logbook 2.2.3
    stefan_ritt elog web logbook 2.2.4
    stefan_ritt elog web logbook 2.4
    stefan_ritt elog web logbook 2.5
    stefan_ritt elog web logbook 2.5.6
    stefan_ritt elog web logbook 2.5.6
    debian debian linux 3.1
    debian debian linux 3.1