Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2006-6144
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-10 Jan, 2007 | 00:00
Updated At-07 Aug, 2024 | 20:19
Rejected At-
▼CVE Numbering Authority (CNA)

The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/31417
vdb-entry
x_refsource_XF
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1
vendor-advisory
x_refsource_SUNALERT
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA07-009B.html
third-party-advisory
x_refsource_CERT
http://secunia.com/advisories/23690
third-party-advisory
x_refsource_SECUNIA
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html
vendor-advisory
x_refsource_SUSE
http://securitytracker.com/id?1017494
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/23706
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/456409/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/23903
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200701-21.xml
vendor-advisory
x_refsource_GENTOO
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html
vendor-advisory
x_refsource_OPENPKG
http://fedoranews.org/cms/node/2375
vendor-advisory
x_refsource_FEDORA
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt
x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-925
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0112
vdb-entry
x_refsource_VUPEN
http://osvdb.org/31280
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/35151
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/21975
vdb-entry
x_refsource_BID
http://www.vupen.com/english/advisories/2007/0111
vdb-entry
x_refsource_VUPEN
http://www.kb.cert.org/vuls/id/831452
third-party-advisory
x_refsource_CERT-VN
http://secunia.com/advisories/23701
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/31417
vdb-entry
x_refsource_XF
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA07-009B.html
third-party-advisory
x_refsource_CERT
x_transferred
http://secunia.com/advisories/23690
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://securitytracker.com/id?1017494
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/23706
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/456409/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/23903
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200701-21.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://fedoranews.org/cms/node/2375
vendor-advisory
x_refsource_FEDORA
x_transferred
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt
x_refsource_CONFIRM
x_transferred
https://issues.rpath.com/browse/RPL-925
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/0112
vdb-entry
x_refsource_VUPEN
x_transferred
http://osvdb.org/31280
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/35151
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/21975
vdb-entry
x_refsource_BID
x_transferred
http://www.vupen.com/english/advisories/2007/0111
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.kb.cert.org/vuls/id/831452
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://secunia.com/advisories/23701
third-party-advisory
x_refsource_SECUNIA
x_transferred
Details not found