{"api_version":"1","generated_at":"2026-04-23T08:39:31+00:00","cve":"CVE-2006-4620","urls":{"html":"https://cve.report/CVE-2006-4620","api":"https://cve.report/api/cve/CVE-2006-4620.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-4620","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-4620"},"summary":{"title":"CVE-2006-4620","description":"The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2006-09-07 00:04:00","updated_at":"2018-10-17 21:38:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://files.altn.com/WebAdmin/Release/RelNotes_en.txt","name":"http://files.altn.com/WebAdmin/Release/RelNotes_en.txt","refsource":"CONFIRM","tags":["Patch"],"title":"Alt-N Technologies: 404 Error","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/21727","name":"21727","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"WebAdmin \"MDaemon\" Account Access Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/28548","name":"28548","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://securityreason.com/securityalert/1516","name":"1516","refsource":"SREASON","tags":[],"title":"SecurityReason - Alt-N WebAdmin MDaemon Account Hijacking","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.teklow.com/advisories/TTG0602.txt","name":"http://www.teklow.com/advisories/TTG0602.txt","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"404 Not Found\n    \n    \n    \n      – Teklow","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/445153/100/0/threaded","name":"20060904 TTG0602 - Alt-N WebAdmin MDaemon Account Hijacking","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28776","name":"webadmin-mdaemon-privilege-escalation(28776)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-4620","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4620","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"3.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4620","vulnerable":"1","versionEndIncluding":"3.2.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"alt-n","cpe5":"webadmin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-4620","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20060904 TTG0602 - Alt-N WebAdmin MDaemon Account Hijacking","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/445153/100/0/threaded"},{"name":"28548","refsource":"OSVDB","url":"http://www.osvdb.org/28548"},{"name":"21727","refsource":"SECUNIA","url":"http://secunia.com/advisories/21727"},{"name":"http://www.teklow.com/advisories/TTG0602.txt","refsource":"MISC","url":"http://www.teklow.com/advisories/TTG0602.txt"},{"name":"http://files.altn.com/WebAdmin/Release/RelNotes_en.txt","refsource":"CONFIRM","url":"http://files.altn.com/WebAdmin/Release/RelNotes_en.txt"},{"name":"webadmin-mdaemon-privilege-escalation(28776)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28776"},{"name":"1516","refsource":"SREASON","url":"http://securityreason.com/securityalert/1516"}]}},"nvd":{"publishedDate":"2006-09-07 00:04:00","lastModifiedDate":"2018-10-17 21:38:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:alt-n:webadmin:3.2.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:alt-n:webadmin:3.0.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:alt-n:webadmin:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:alt-n:webadmin:3.2.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:alt-n:webadmin:3.0.3:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"4620","Ordinal":"19956","Title":"CVE-2006-4620","CVE":"CVE-2006-4620","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"4620","Ordinal":"1","NoteData":"The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"4620","Ordinal":"2","NoteData":"2006-09-06","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"4620","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}