Vulnerabilities Checklists Product Dictionary Impact Metrics Data Feeds Statistics
Home ISAP/SCAP SCAP Compatible Tools SCAP Events About Contact Vendor Comments
Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status

NVD contains:

25002 CVE Vulnerabilities
114Checklists
90 US-CERT Alerts
1964 US-CERT Vuln Notes
2966OVAL Queries
11033Vulnerable Products

Last updated:  06/20/07

CVE Publication rate:

17 vulnerabilities / day
Email List

Select the email list(s) you wish to join, enter your e-mail address and press "Add" to receive NVD announcements or SCAP information.

NVD Announcements
SCAP Announcements
SCAP Discussion List
Workload Index
Vulnerability Workload Index: 7.58
About Us

NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Cyber-Alert System
Vulnerability Summary CVE-2006-6475
Original release date: 12/19/2006
Last revised: 12/20/2006
Source: US-CERT/NIST

 

Overview

FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode with SSL enabled, allows remote attackers to cause a denial of service (refused connections) via malformed requests, which results in a mishandled exception.

 

Impact

CVSS Severity (version 2.0):
Base score: 7.1 (High)
Impact Subscore: 6.9
Exploitability Subscore: 8.6

Range: Network exploitable
Authentication: Not required to exploit
Impact Type: Allows disruption of service

 

Solution

Successful exploitation requires that the affected products are run in daemon mode with SSL enabled.
This vulnerability is addressed in the following product release:
Mandiant, First Response, 1.1.1

 

References to Advisories, Solutions, and Tools

External Source: (disclaimer)

Type:  Patch Information
Hyperlink: http://www.symantec.com/enterprise/research/SYMSA-2006-013.txt

 

External Source:  BID (disclaimer)

Name: 21548

Type:  Patch Information
Hyperlink: http://www.securityfocus.com/bid/21548

 

External Source:  BUGTRAQ (disclaimer)

Name: 20061218 SYMSA-2006-013: Multiple Vulnerabilities in Mandiant First Response

Type:  Advisory , Patch Information
Hyperlink: http://www.securityfocus.com/archive/1/archive/1/454712/100/0/threaded

 

External Source:  FRSIRT (disclaimer)

Name: ADV-2006-5061

Type:  Advisory , Patch Information
Hyperlink: http://www.frsirt.com/english/advisories/2006/5061

 

External Source:  SECTRACK (disclaimer)

Name: 1017394

Type:  Patch Information
Hyperlink: http://securitytracker.com/id?1017394

 

External Source:  SECUNIA (disclaimer)

Name: 23393

Type:  Advisory , Patch Information
Hyperlink: http://secunia.com/advisories/23393

 

External Source: (disclaimer)

Hyperlink: http://www.mandiant.com/firstresponse.htm

 

Vulnerable software and versions

Configuration 1
−  Mandiant, First Response, 1.1, and previous 

 

Technical Details

CVSS Base Score Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C) (legend)

Vulnerability Type: Design Error

 

CVE Standard Vulnerability Entry:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6475

 

http://nvd.nist.gov/cpe.cfm?cvename=CVE-2006-6475

 

Disclaimer Notice & Privacy Statement / Security Notice

Send comments or suggestions to nvd@nist.gov

NIST is an Agency of the U.S. Commerce Department

Full vulnerability listing