RSS   Vulnerabilities for 'Chetcpasswd'   RSS

2006-12-21
 
CVE-2006-6685

CWE-119
 

 
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd 2.3.3 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long REMOTE_ADDR environment variable. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.

 
 
CVE-2006-6684

CWE-119
 

 
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd before 2.4 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long X-Forwarded-For HTTP header. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.

 
 
CVE-2006-6683

CWE-264
 

 
Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM.

 
 
CVE-2006-6679

 

 
Pedro Lineu Orso chetcpasswd before 2.4 relies on the X-Forwarded-For HTTP header when verifying a client's status on an IP address ACL, which allows remote attackers to gain unauthorized access by spoofing this header.

 

 >>> Vendor: Pedro lineu orso 2 Products
Chetcpasswd
SARG


Copyright 2024, cxsecurity.com

 

Back to Top