Vulnerability Name:

CVE-2006-5708 (CCN-30224)

Assigned:2006-10-30
Published:2006-10-30
Updated:2008-09-05
Summary:Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
This vulnerability is addressed in the following product release:
Alt-N Technologies, MDaemon, 9.50
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2006-5708

Source: CCN
Type: MDaemon Web page
MDaemon Server v9.X Release Notes

Source: CONFIRM
Type: Patch
http://files.altn.com/MDaemon/Release/RelNotes_en.txt

Source: CCN
Type: Alt-N Technologies Web site
WebAdmin

Source: CCN
Type: OSVDB ID: 33925
MDaemon Unspecified Memory Consumption DoS

Source: XF
Type: UNKNOWN
mdaemon-worldclient-unspecified-dos(30224)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:*:*:*:*:*:*:*:* (Version <= 9.50)

  • * Denotes that component is vulnerable
    BACK
    alt-n mdaemon 2.8
    alt-n mdaemon 2.8.5.0
    alt-n mdaemon 2.71_sp1
    alt-n mdaemon 3.0.3
    alt-n mdaemon 3.0.4
    alt-n mdaemon 3.1.1
    alt-n mdaemon 3.1.2
    alt-n mdaemon 3.1_beta
    alt-n mdaemon 3.5.0
    alt-n mdaemon 3.5.1
    alt-n mdaemon 3.5.4
    alt-n mdaemon 3.5.4
    alt-n mdaemon 3.5.4
    alt-n mdaemon 3.5.6
    alt-n mdaemon 5.0
    alt-n mdaemon 5.0
    alt-n mdaemon 5.0.1
    alt-n mdaemon 5.0.2
    alt-n mdaemon 5.0.3
    alt-n mdaemon 5.0.4
    alt-n mdaemon 5.0.5
    alt-n mdaemon 5.0.6
    alt-n mdaemon 5.0.7
    alt-n mdaemon 6.0
    alt-n mdaemon 6.0.5
    alt-n mdaemon 6.0.6
    alt-n mdaemon 6.0.7
    alt-n mdaemon 6.5.0
    alt-n mdaemon 6.5.1
    alt-n mdaemon 6.5.2
    alt-n mdaemon 6.7.5
    alt-n mdaemon 6.7.9
    alt-n mdaemon 6.8.0
    alt-n mdaemon 6.8.1
    alt-n mdaemon 6.8.2
    alt-n mdaemon 6.8.3
    alt-n mdaemon 6.8.4
    alt-n mdaemon 6.8.5
    alt-n mdaemon 7.2
    alt-n mdaemon 8.1.1
    alt-n mdaemon 8.1.3
    alt-n mdaemon 8.1.4
    alt-n mdaemon 9.0.1
    alt-n mdaemon 9.0.2
    alt-n mdaemon 9.0.3
    alt-n mdaemon 9.0.4
    alt-n mdaemon 9.0.5
    alt-n mdaemon *