{"api_version":"1","generated_at":"2026-04-23T19:05:31+00:00","cve":"CVE-2006-6105","urls":{"html":"https://cve.report/CVE-2006-6105","api":"https://cve.report/api/cve/CVE-2006-6105.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-6105","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-6105"},"summary":{"title":"CVE-2006-6105","description":"Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.","state":"PUBLISHED","assigner":"redhat","published_at":"2006-12-15 02:28:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:L/AC:L/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P","baseScore":4.3,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/23381","name":"http://secunia.com/advisories/23381","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Mandriva update for gdm - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23409","name":"http://secunia.com/advisories/23409","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/5015","name":"http://www.vupen.com/english/advisories/2006/5015","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23385","name":"http://secunia.com/advisories/23385","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for gdm - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-396-1","name":"http://www.ubuntu.com/usn/usn-396-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"usn/usn-396-1 - Ubuntu: Linux for human beings","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017320","name":"http://securitytracker.com/id?1017320","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"GNOME Structured File Library ole_init_info() Heap Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=453","name":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=453","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/21597","name":"http://www.securityfocus.com/bid/21597","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"GNOME Display Manager GDMChooser Local Format String Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securitytracker.com/id?1017383","name":"http://securitytracker.com/id?1017383","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"GNOME Display Manager Lets Local Users Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ftp.acc.umu.se/pub/GNOME/sources/gdm/2.17/gdm-2.17.4.news","name":"http://ftp.acc.umu.se/pub/GNOME/sources/gdm/2.17/gdm-2.17.4.news","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_29_sr.html","name":"http://www.novell.com/linux/security/advisories/2006_29_sr.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:231","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:231","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30896","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30896","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23387","name":"http://secunia.com/advisories/23387","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"GNOME Foundation Display Manager \"gdmchooser\" Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/30848","name":"http://www.osvdb.org/30848","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-6105","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6105","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"6105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"gdm","cpe6":"2.14.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"gdm","cpe6":"2.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"gdm","cpe6":"2.16.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"gdm","cpe6":"2.16.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-6105","organization":"Red Hat","lastmodified":"2007-03-14","contributor":"Mark J Cox","statementText":"Not vulnerable. This flaw was first introduced in gdm version 2.14. Therefore these issues did not affect the earlier versions of gdm as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.","cve_year":"2006","cve_id":"6105","crc32":"1756baf8"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T20:12:31.762Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"23385","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23385"},{"name":"23387","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23387"},{"name":"ADV-2006-5015","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/5015"},{"name":"23409","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23409"},{"name":"1017383","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1017383"},{"name":"1017320","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1017320"},{"name":"30848","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/30848"},{"name":"gdmchooser-host-chooser-format-string(30896)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30896"},{"name":"21597","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/21597"},{"name":"23381","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23381"},{"name":"20061214 GNOME Foundation Display Manager gdmchooser Format String Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE","x_transferred"],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=453"},{"name":"SUSE-SR:2006:029","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2006_29_sr.html"},{"name":"MDKSA-2006:231","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:231"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://ftp.acc.umu.se/pub/GNOME/sources/gdm/2.17/gdm-2.17.4.news"},{"name":"USN-396-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-396-1"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-12-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-19T15:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"23385","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23385"},{"name":"23387","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23387"},{"name":"ADV-2006-5015","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/5015"},{"name":"23409","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23409"},{"name":"1017383","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1017383"},{"name":"1017320","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1017320"},{"name":"30848","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/30848"},{"name":"gdmchooser-host-chooser-format-string(30896)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30896"},{"name":"21597","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/21597"},{"name":"23381","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23381"},{"name":"20061214 GNOME Foundation Display Manager gdmchooser Format String Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE"],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=453"},{"name":"SUSE-SR:2006:029","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2006_29_sr.html"},{"name":"MDKSA-2006:231","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:231"},{"tags":["x_refsource_CONFIRM"],"url":"http://ftp.acc.umu.se/pub/GNOME/sources/gdm/2.17/gdm-2.17.4.news"},{"name":"USN-396-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-396-1"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-6105","datePublished":"2006-12-15T02:00:00.000Z","dateReserved":"2006-11-24T00:00:00.000Z","dateUpdated":"2024-08-07T20:12:31.762Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-12-15 02:28:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P","baseScore":4.3,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.1,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gdm:2.14.1:*:*:*:*:*:*:*","matchCriteriaId":"9B84ACF2-E06C-47E5-B221-78285238BA78"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:*","matchCriteriaId":"832DE81E-18BB-4276-A6B0-F316A322E83E"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gdm:2.16.1:*:*:*:*:*:*:*","matchCriteriaId":"D01F3328-9DB5-4C75-A9BD-96243975A362"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gdm:2.16.2:*:*:*:*:*:*:*","matchCriteriaId":"24D361EF-B35F-46D9-9DF3-9254FFAD0A1F"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"6105","Ordinal":"1","Title":"CVE-2006-6105","CVE":"CVE-2006-6105","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"6105","Ordinal":"1","NoteData":"Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.","Type":"Description","Title":"CVE-2006-6105"},{"CveYear":"2006","CveId":"6105","Ordinal":"2","NoteData":"2006-12-14","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"6105","Ordinal":"3","NoteData":"2017-07-19","Type":"Other","Title":"Modified"}]}}}