U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2006-5779

Change History

Modified Analysis by NIST 2/07/2024 9:20:45 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.10:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.11:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.12:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.13:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.14:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.15:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.16:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.17:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.18:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.19:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.20:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.21:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.22:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.23:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.24:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.25:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.26:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:2.3.27:*:*:*:*:*:*:*
     *cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:* versions up to (including) 2.3.28
OR
     *cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.29
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-617
Removed CWE
NIST CWE-399

								
						
Changed Reference Type
http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz Exploit
http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz Broken Link, Exploit
Changed Reference Type
http://gleg.net/vulndisco_meta.shtml Exploit
http://gleg.net/vulndisco_meta.shtml Broken Link, Exploit
Changed Reference Type
http://secunia.com/advisories/22750 Vendor Advisory
http://secunia.com/advisories/22750 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/22953 Vendor Advisory
http://secunia.com/advisories/22953 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/22996 Vendor Advisory
http://secunia.com/advisories/22996 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/23125 Vendor Advisory
http://secunia.com/advisories/23125 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/23133 Vendor Advisory
http://secunia.com/advisories/23133 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/23152 Vendor Advisory
http://secunia.com/advisories/23152 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/23170 Vendor Advisory
http://secunia.com/advisories/23170 Broken Link, Vendor Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200611-25.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-200611-25.xml Third Party Advisory
Changed Reference Type
http://securityreason.com/securityalert/1831 No Types Assigned
http://securityreason.com/securityalert/1831 Broken Link
Changed Reference Type
http://securitytracker.com/id?1017166 Exploit
http://securitytracker.com/id?1017166 Broken Link, Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 Broken Link
Changed Reference Type
http://www.novell.com/linux/security/advisories/2006_72_openldap2.html No Types Assigned
http://www.novell.com/linux/security/advisories/2006_72_openldap2.html Broken Link
Changed Reference Type
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 No Types Assigned
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 Exploit, Issue Tracking
Changed Reference Type
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html No Types Assigned
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/450728/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/450728/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/20939 Exploit
http://www.securityfocus.com/bid/20939 Broken Link, Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.trustix.org/errata/2006/0066/ No Types Assigned
http://www.trustix.org/errata/2006/0066/ Broken Link
Changed Reference Type
http://www.ubuntu.com/usn/usn-384-1 No Types Assigned
http://www.ubuntu.com/usn/usn-384-1 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2006/4379 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4379 Broken Link, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/30076 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/30076 Third Party Advisory, VDB Entry
Changed Reference Type
https://issues.rpath.com/browse/RPL-820 No Types Assigned
https://issues.rpath.com/browse/RPL-820 Broken Link