Unrated severityNVD Advisory· Published Dec 21, 2006· Updated Apr 23, 2026
CVE-2006-6684
CVE-2006-6684
Description
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd before 2.4 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long X-Forwarded-For HTTP header. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
Affected products
2cpe:2.3:a:pedro_lineu_orso:chetcpasswd:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:*:*:*:*:*:*:*:*range: <=2.3.3
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- bugs.debian.org/cgi-bin/bugreport.cginvdVendor Advisory
- secunia.com/advisories/22967nvdVendor Advisory
- www.osvdb.org/30546nvdVendor Advisory
News mentions
0No linked articles in our index yet.