CVE-2006-0039

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.

References

http://bugs.gentoo.org/show_bug.cgi?id=133465

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17

http://secunia.com/advisories/20185

http://secunia.com/advisories/20671

http://secunia.com/advisories/20914

http://secunia.com/advisories/20991

http://secunia.com/advisories/21476

http://secunia.com/advisories/22292

http://secunia.com/advisories/22945

http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm

http://www.debian.org/security/2006/dsa-1097

http://www.debian.org/security/2006/dsa-1103

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2722971cbe831117686039d5c334f2c0f560be13

http://www.osvdb.org/25697

http://www.redhat.com/support/errata/RHSA-2006-0689.html

http://www.securityfocus.com/bid/18113

http://www.ubuntu.com/usn/usn-311-1

http://www.vupen.com/english/advisories/2006/1893

http://www.vupen.com/english/advisories/2006/2554

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191698

https://exchange.xforce.ibmcloud.com/vulnerabilities/26583

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10309

Details

Source: MITRE

Published: 2006-05-19

Updated: 2017-10-11

Type: CWE-362

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:H/Au:N/C:P/I:N/A:C

Impact Score: 7.8

Exploitability Score: 1.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*

Tenable Plugins

View all (8 total)

IDNameProductFamilySeverity
67401Oracle Linux 4 : kernel (ELSA-2006-0617 / ELSA-2006-0689)NessusOracle Linux Local Security Checks
high
27886Ubuntu 5.04 / 5.10 / 6.06 LTS : linux-source-2.6.10/-2.6.12/-2.6.15 vulnerabilities (USN-311-1)NessusUbuntu Local Security Checks
medium
22645Debian DSA-1103-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22639Debian DSA-1097-1 : kernel-source-2.4.27 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22523RHEL 4 : kernel (RHSA-2006:0689)NessusRed Hat Local Security Checks
high
22513CentOS 4 : kernel (CESA-2006:0689)NessusCentOS Local Security Checks
high
3469Kerio MailServer < 6.1.3 Patch 1 Remote DoSNessus Network MonitorSMTP Servers
medium
801422CentOS RHSA-2006-0689 Security CheckLog Correlation EngineGeneric
high