CVE-2006-6681

Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chetcpasswd:chetcpasswd:2.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 - Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 - Patch
References () http://marc.info/?l=bugtraq&m=116371297325564&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=116371297325564&w=2 - Mailing List
References () http://secunia.com/advisories/22967 - Vendor Advisory () http://secunia.com/advisories/22967 - Vendor Advisory
References () http://www.securityfocus.com/bid/21102 - Vendor Advisory () http://www.securityfocus.com/bid/21102 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30455 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30455 -

Information

Published : 2006-12-21 19:28

Updated : 2024-11-21 00:23


NVD link : CVE-2006-6681

Mitre link : CVE-2006-6681

CVE.ORG link : CVE-2006-6681


JSON object : View

Products Affected

chetcpasswd

  • chetcpasswd
CWE
CWE-399

Resource Management Errors