Vulnerability Details : CVE-2006-0056
Double free vulnerability in the authentication and authentication token alteration code in PAM-MySQL 0.6.x before 0.6.2 and 0.7.x before 0.7pre3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted passwords, which lead to a double free of a pointer that was created by the pam_get_item function. NOTE: this issue only occurs in certain configurations in which there are multiple PAM modules, PAM-MySQL is not evaluated first, and there are no requisite modules before PAM-MySQL.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2006-0056
Probability of exploitation activity in the next 30 days: 27.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-0056
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-0056
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-0056
-
http://www.kb.cert.org/vuls/id/693909
Patch;Third Party Advisory;US Government Resource
-
http://securitytracker.com/id?1015603
Patch
- http://www.vupen.com/english/advisories/2006/0490
-
http://jvn.jp/cert/JVNVU%23693909/index.html
- http://www.securityfocus.com/bid/16564
- http://sourceforge.net/forum/forum.php?forum_id=499394
- http://www.gentoo.org/security/en/glsa/glsa-200606-18.xml
Products affected by CVE-2006-0056
- cpe:2.3:a:pam-mysql:pam-mysql:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.7_pre2:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.7_pre1:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:pam-mysql:pam-mysql:0.5:*:*:*:*:*:*:*