{"api_version":"1","generated_at":"2026-05-11T05:09:04+00:00","cve":"CVE-2006-2391","urls":{"html":"https://cve.report/CVE-2006-2391","api":"https://cve.report/api/cve/CVE-2006-2391.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2391","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2391"},"summary":{"title":"CVE-2006-2391","description":"Buffer overflow in EMC Retrospect Client 5.1 through 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2006-05-16 01:02:00","updated_at":"2018-10-18 16:39:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/18064","name":"18064","refsource":"BID","tags":[],"title":"EMC Retrospect Client Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/1766","name":"ADV-2006-1766","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt","name":"http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt","refsource":"MISC","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20080","name":"20080","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016063","name":"1016063","refsource":"SECTRACK","tags":["Patch"],"title":"EMC Retrospect Client Buffer Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016136","name":"1016136","refsource":"SECTRACK","tags":["Patch"],"title":"EMC Retrospect Client Buffer Overflow Lets Remote Users Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26380","name":"retrospect-client-bo(26380)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/17948","name":"17948","refsource":"BID","tags":["Patch"],"title":"EMC Dantz Retrospect Backup Client Remote Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511","name":"http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511","refsource":"CONFIRM","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.kb.cert.org/vuls/id/186944","name":"VU#186944","refsource":"CERT-VN","tags":["US Government Resource"],"title":"US-CERT Vulnerability Note VU#186944","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434726/100/0/threaded","name":"20060522 ACROS Security: Buffer Overflow In EMC (previously Dantz) Retroclient Service","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2391","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2391","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"7.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2391","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"retrospect_client","cpe6":"7.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2391","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in EMC Retrospect Client 5.1 through 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20060522 ACROS Security: Buffer Overflow In EMC (previously Dantz) Retroclient Service","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434726/100/0/threaded"},{"name":"http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt","refsource":"MISC","url":"http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt"},{"name":"20080","refsource":"SECUNIA","url":"http://secunia.com/advisories/20080"},{"name":"VU#186944","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/186944"},{"name":"17948","refsource":"BID","url":"http://www.securityfocus.com/bid/17948"},{"name":"http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511","refsource":"CONFIRM","url":"http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511"},{"name":"ADV-2006-1766","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1766"},{"name":"1016136","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016136"},{"name":"retrospect-client-bo(26380)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26380"},{"name":"1016063","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016063"},{"name":"18064","refsource":"BID","url":"http://www.securityfocus.com/bid/18064"}]}},"nvd":{"publishedDate":"2006-05-16 01:02:00","lastModifiedDate":"2018-10-18 16:39:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:retrospect_client:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:retrospect_client:6.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:retrospect_client:5.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:retrospect_client:7.5:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2391","Ordinal":"17701","Title":"CVE-2006-2391","CVE":"CVE-2006-2391","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2391","Ordinal":"1","NoteData":"Buffer overflow in EMC Retrospect Client 5.1 through 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"2391","Ordinal":"2","NoteData":"2006-05-15","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2391","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}