CVE-2006-4901
Published Sep 22, 2006
Last updated 4 years ago
Overview
- Description
- Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, and eTrust Audit 1.5 and r8, allows remote attackers to spoof alerts and conduct replay attacks by invoking eTSAPISend.exe with the desired arguments.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AADF88C7-8F85-4FA9-82DD-4896404A92C3" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "315F1B77-C655-4131-87DA-EBC171FEDEC3" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_client:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "555B7B8E-8047-4890-810D-DECDFC730BC8" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "209DFBD5-5E38-42A1-945D-4879C5FAFDE3" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DDC23AF-EEC3-4DF9-8EC6-A7B094224EDF" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB1A4631-D677-468C-9A31-DD5C4BBDDF28" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25AEF3E6-1113-41A5-9357-96F8374C4A7B" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2749B665-DA7F-4F6A-9F52-3A4D0A10BAFD" }, { "criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6AD8658-B2BB-4E60-8EAA-7B491F2D6027" }, { "criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C363D8B-1022-4C2A-BEDE-34EAB274D9D7" }, { "criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB8C8321-1BE6-476D-910E-6BBDBE683309" }, { "criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "054689EB-D43E-4C0F-B504-FE615607332A" }, { "criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40DC453F-12F6-4D51-ADFF-71D2628F3CD8" } ], "operator": "OR" } ] } ]