Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-5601
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-28 Oct, 2006 | 01:07
Updated At-20 Jul, 2017 | 01:33

Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.0HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

xsupplicant
xsupplicant
>>xsupplicant>>Versions up to 1.2.5(inclusive)
cpe:2.3:a:xsupplicant:xsupplicant:*:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>0.5
cpe:2.3:a:xsupplicant:xsupplicant:0.5:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>0.6
cpe:2.3:a:xsupplicant:xsupplicant:0.6:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>0.7
cpe:2.3:a:xsupplicant:xsupplicant:0.7:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>0.8
cpe:2.3:a:xsupplicant:xsupplicant:0.8:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>0.8b
cpe:2.3:a:xsupplicant:xsupplicant:0.8b:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.0
cpe:2.3:a:xsupplicant:xsupplicant:1.0:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.0.1
cpe:2.3:a:xsupplicant:xsupplicant:1.0.1:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.0pre1
cpe:2.3:a:xsupplicant:xsupplicant:1.0pre1:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.0pre2
cpe:2.3:a:xsupplicant:xsupplicant:1.0pre2:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.2
cpe:2.3:a:xsupplicant:xsupplicant:1.2:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.2.1
cpe:2.3:a:xsupplicant:xsupplicant:1.2.1:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.2.2
cpe:2.3:a:xsupplicant:xsupplicant:1.2.2:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.2.3
cpe:2.3:a:xsupplicant:xsupplicant:1.2.3:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.2.4
cpe:2.3:a:xsupplicant:xsupplicant:1.2.4:*:*:*:*:*:*:*
xsupplicant
xsupplicant
>>xsupplicant>>1.2pre1
cpe:2.3:a:xsupplicant:xsupplicant:1.2pre1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://open1x.cvs.sourceforge.net/open1x/xsupplicant/src/eap.c?r1=1.135&r2=1.136cve@mitre.org
N/A
http://secunia.com/advisories/22612cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22641cve@mitre.org
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:189cve@mitre.org
N/A
http://www.novell.com/linux/security/advisories/2007_01_sr.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/20775cve@mitre.org
Patch
http://www.vupen.com/english/advisories/2006/4233cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29902cve@mitre.org
N/A
Change History
0Changes found

Details not found