CVE-2006-2655
Published Jun 2, 2006
Last updated 7 years ago
Overview
- Description
- The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.
- Source
- secteam@freebsd.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD85B1ED-1473-4C22-9E1E-53F07CF517E9" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46A60ED5-1D92-4B40-956F-D1801CAB9039" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60F7B4A9-4036-4061-8F3D-BDC3F1282EC0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D2C79D5-D27F-4B08-A8DF-3E3AAF4E16A5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCE4F2E6-2286-4D87-ADD7-7E999B4E5620" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C07C3BEF-8D6A-4F23-96DE-AFE4369D08EF" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4416CBA-76B9-4051-B015-F1BE89517309" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C64EE9C-18E1-49C6-96DE-7E6F1607C0D7" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "231B70A8-890A-4790-A33A-64228656BF0E" } ], "operator": "OR" } ] } ]