Vulnerability Details : CVE-2006-1936
Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2006-1936
Probability of exploitation activity in the next 30 days: 2.66%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-1936
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-1936
- http://www.ethereal.com/appnotes/enpa-sa-00023.html
- http://securitytracker.com/id?1015985
- http://www.redhat.com/support/errata/RHSA-2006-0420.html
- http://www.gentoo.org/security/en/glsa/glsa-200604-17.xml
- http://www.securityfocus.com/bid/17682
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26029
- http://www.debian.org/security/2006/dsa-1049
- http://support.avaya.com/elmodocs2/security/ASA-2006-128.htm
- http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00194.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:077
-
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
Object not found!
- http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00195.html
- http://www.vupen.com/english/advisories/2006/1501
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10341
- ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
Products affected by CVE-2006-1936
- cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*