Vulnerability Name:

CVE-2006-0600 (CCN-23838)

Assigned:2005-12-19
Published:2005-12-19
Updated:2017-07-20
Summary:elog before 2.5.7 r1558-4 allows remote attackers to cause a denial of service (infinite redirection) via a request with the fail parameter set to 1, which redirects to the same request.
CVSS v3 Severity:7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Full-Disclosure Mailing List, Mon Dec 19 2005 - 04:10:29 CST
elogd 2.6.0 overflow

Source: MISC
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528

Source: MITRE
Type: CNA
CVE-2005-4439

Source: MITRE
Type: CNA
CVE-2006-0600

Source: CCN
Type: PenguinSoft Web site
elogd - web server program for Electronic Logbook ELOG Linux Man Page

Source: MISC
Type: UNKNOWN
http://savannah.psi.ch/viewcvs/trunk/src/elogd.c?root=elog&rev=1487&view=diff&r1=1487&r2=1486&p1=trunk/src/elogd.c&p2=/trunk/src/elogd.c

Source: CCN
Type: SA18124
ELOG Long Parameter Value Denial of Service Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
18783

Source: CCN
Type: SECTRACK ID: 1015379
ELOG elogd Can Be Crashed By Remote Users

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-967

Source: DEBIAN
Type: DSA-967
elog -- several vulnerabilities

Source: CCN
Type: OSVDB ID: 21844
ELOG Multiple Parameter Overflow DoS

Source: CCN
Type: BID-15932
ELOG Web Logbook Multiple Remote Buffer Overflow Vulnerabilities

Source: BID
Type: UNKNOWN
16579

Source: CCN
Type: BID-16579
ELOG Web Logbook Multiple Remote Vulnerabilities

Source: XF
Type: UNKNOWN
elogd-http-request-bo(23838)

Source: XF
Type: UNKNOWN
elog-fail-redirect-dos(24707)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-0600 (CCN-24707)

    Assigned:2006-02-10
    Published:2006-02-10
    Updated:2006-02-10
    Summary:ELOG is vulnerable to a denial of service. If the fail parameter is set to 1, a remote attacker could cause an infinite redirection resulting in a denial of service condition.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2006-0600

    Source: CCN
    Type: ELOG download page
    ELOG download page

    Source: DEBIAN
    Type: DSA-967
    elog -- several vulnerabilities

    Source: CCN
    Type: BID-16579
    ELOG Web Logbook Multiple Remote Vulnerabilities

    Source: XF
    Type: UNKNOWN
    elog-fail-redirect-dos(24707)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:967
    V
    several vulnerabilities
    2006-02-10
    BACK
    stefan_ritt elog web logbook 2.0.0
    stefan_ritt elog web logbook 2.0.1
    stefan_ritt elog web logbook 2.0.2
    stefan_ritt elog web logbook 2.0.3
    stefan_ritt elog web logbook 2.0.4
    stefan_ritt elog web logbook 2.0.5
    stefan_ritt elog web logbook 2.1.0
    stefan_ritt elog web logbook 2.1.1
    stefan_ritt elog web logbook 2.1.2
    stefan_ritt elog web logbook 2.1.3
    stefan_ritt elog web logbook 2.2.0
    stefan_ritt elog web logbook 2.2.1
    stefan_ritt elog web logbook 2.2.2
    stefan_ritt elog web logbook 2.2.3
    stefan_ritt elog web logbook 2.2.4
    stefan_ritt elog web logbook 2.4
    stefan_ritt elog web logbook 2.5
    stefan_ritt elog web logbook 2.5.6
    debian debian linux 3.1
    debian debian linux 3.1