Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd 2.3.3 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long REMOTE_ADDR environment variable.  NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2006-6668 | Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd 2.3.3 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long REMOTE_ADDR environment variable. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| http://secunia.com/advisories/22967 | 
                     | 
            
History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T20:23:02.802Z
Reserved: 2006-12-21T00:00:00Z
Link: CVE-2006-6685
No data.
Status : Deferred
Published: 2006-12-21T19:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-6685
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD