Vulnerability CVE-2006-7254


Published: 2019-04-10

Description:
The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.

Type:

CWE-19

(Data Handling)

Vendor: GNU
Product: Glibc 
Version:
2.4
2.3.6
2.3.5
2.3.4
2.3.3
2.3.2
2.3.10
2.3.1
2.3
2.2.5
2.2.4
2.2.3
2.2.2
2.2.1
2.2
2.1.9
2.1.3.10
2.1.3
2.1.2
2.1.1.6
2.1.1
2.1
2.0.6
2.0.5
2.0.4
2.0.3
2.0.2
2.0.1
2.0
1.09.5
1.09.3
1.09.2
1.09.1
1.09
1.08.9
1.08.8
1.08.7
1.08.6
1.08.5
1.08.4
1.08.3
1.08.14
1.08.13
1.08.12
1.08.11
1.08.10
1.08.1
1.08
1.07.6
1.07.5
1.07.4
1.07.3
1.07.2
1.07.1
1.07
1.06.9
1.06.8
1.06.7
1.06.6
1.06.4
1.06.3
1.06.2
1.06.13
1.06.12
1.06.11
1.06.10
1.06.1
1.06
1.05
1.04
1.03
1.02
1.01
1.00
0.6
0.5
0.4.1
0.4
0.1

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
https://sourceware.org/bugzilla/show_bug.cgi?id=2498

Related CVE
CVE-2019-5953
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
CVE-2019-11640
An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a.
CVE-2019-11639
An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a.
CVE-2019-11638
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_field_name_equal_p at rec-field-name.c in librec.a, leading to a crash.
CVE-2019-11637
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_rset_get_props at rec-rset.c in librec.a, leading to a crash.
CVE-2005-3590
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to ...
CVE-2019-3836
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
CVE-2019-3829
A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is...

Copyright 2019, cxsecurity.com

 

Back to Top