[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-0457Date: (C)2006-03-13   (M)2023-12-22


Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.1
Exploit Score: 4.9
Impact Score: 9.2
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: COMPLETE
Integrity: NONE
Availability: COMPLETE
  
Reference:
BID-17084
SECUNIA-19220
SECUNIA-20398
SECUNIA-21465
SECUNIA-22417
OSVDB-23894
MDKSA-2006:059
RHSA-2006:0575
SUSE-SA:2006:028
USN-263-1
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
kernel-addkey-dos(25354)
oval:org.mitre.oval:def:9566

CPE    86
cpe:/o:linux:linux_kernel:2.6.1:rc1
cpe:/o:linux:linux_kernel:2.6.15:rc1
cpe:/o:linux:linux_kernel:2.6.15
cpe:/o:linux:linux_kernel:2.6.14
...

© SecPod Technologies