// For flags

CVE-2006-5452

 

Severity Score

4.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument.

Desbordamiento de búfer en dtmail en HP Tru64 UNIX 4.0F hasta 5.1B, y HP-UX B.11.00 hasta B.11.23 permite a usuarios locales ejecutar código de su elección mediante un argumento -a (o attachment) muy largo.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-10-23 CVE Reserved
  • 2006-10-23 CVE Published
  • 2024-03-17 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hp
Search vendor "Hp"
Hp-ux
Search vendor "Hp" for product "Hp-ux"
11.00
Search vendor "Hp" for product "Hp-ux" and version "11.00"
-
Affected
Hp
Search vendor "Hp"
Hp-ux
Search vendor "Hp" for product "Hp-ux"
11.4
Search vendor "Hp" for product "Hp-ux" and version "11.4"
-
Affected
Hp
Search vendor "Hp"
Hp-ux
Search vendor "Hp" for product "Hp-ux"
11.11
Search vendor "Hp" for product "Hp-ux" and version "11.11"
-
Affected
Hp
Search vendor "Hp"
Hp-ux
Search vendor "Hp" for product "Hp-ux"
11.22
Search vendor "Hp" for product "Hp-ux" and version "11.22"
-
Affected
Hp
Search vendor "Hp"
Hp-ux
Search vendor "Hp" for product "Hp-ux"
11.23
Search vendor "Hp" for product "Hp-ux" and version "11.23"
ia64_64-bit
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
4.0f
Search vendor "Hp" for product "Tru64" and version "4.0f"
-
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
4.0f
Search vendor "Hp" for product "Tru64" and version "4.0f"
pk8
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
4.0g
Search vendor "Hp" for product "Tru64" and version "4.0g"
-
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
4.0g
Search vendor "Hp" for product "Tru64" and version "4.0g"
pk4
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.0a
Search vendor "Hp" for product "Tru64" and version "5.0a"
-
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1
Search vendor "Hp" for product "Tru64" and version "5.1"
-
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1a
Search vendor "Hp" for product "Tru64" and version "5.1a"
-
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1a
Search vendor "Hp" for product "Tru64" and version "5.1a"
pk6
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1af
Search vendor "Hp" for product "Tru64" and version "5.1af"
-
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1b
Search vendor "Hp" for product "Tru64" and version "5.1b"
pk1
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1b2
Search vendor "Hp" for product "Tru64" and version "5.1b2"
pk4
Affected
Hp
Search vendor "Hp"
Tru64
Search vendor "Hp" for product "Tru64"
5.1b3
Search vendor "Hp" for product "Tru64" and version "5.1b3"
-
Affected