CVE-2006-5968

N/A Unknown
Published: November 17, 2006 Modified: April 23, 2026
View on NVD

Description

MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/21554
Source: PSIRT-CNA@flexerasoftware.com
http://secunia.com/secunia_research/2006-67/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://securityreason.com/securityalert/1890
Source: PSIRT-CNA@flexerasoftware.com
http://securitytracker.com/id?1017238
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2006/4538
Source: PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/21554
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/secunia_research/2006-67/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/1890
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017238
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/451821/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/4538
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/30331
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
25th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

alt-n