Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2448

Overview

Vulnerability Score 5.6 5.6
CVE Id CVE-2006-2448
Last Modified 07 Mar 2011 09:36:13
Published 23 Jun 2006 06:02:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact NONE NONE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity HIGH
Authentication NONE

CVE-2006-2448

Summary

Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).

Vulnerable Systems

Operating System

  • Linux Kernel 2.6 Test9 Cvs

  • Linux Kernel 2.6.0

  • Linux Kernel 2.6.1

  • Linux Kernel 2.6.10

  • Linux Kernel 2.6.11

  • Linux Kernel 2.6.11.11

  • Linux Kernel 2.6.11.12

  • Linux Kernel 2.6.11.5

  • Linux Kernel 2.6.11.6

  • Linux Kernel 2.6.11.7

  • Linux Kernel 2.6.11.8

  • Linux Kernel 2.6.12

  • Linux Kernel 2.6.12.1

  • Linux Kernel 2.6.12.2

  • Linux Kernel 2.6.12.3

  • Linux Kernel 2.6.12.4

  • Linux Kernel 2.6.12.5

  • Linux Kernel 2.6.12.6

  • Linux Kernel 2.6.13

  • Linux Kernel 2.6.13.1

  • Linux Kernel 2.6.13.2

  • Linux Kernel 2.6.13.3

  • Linux Kernel 2.6.13.4

  • Linux Kernel 2.6.14

  • Linux Kernel 2.6.14.1

  • Linux Kernel 2.6.14.2

  • Linux Kernel 2.6.14.3

  • Linux Kernel 2.6.14.4

  • Linux Kernel 2.6.14.5

  • Linux Kernel 2.6.15

  • Linux Kernel 2.6.15.1

  • Linux Kernel 2.6.15.2

  • Linux Kernel 2.6.15.3

  • Linux Kernel 2.6.15.4

  • Linux Kernel 2.6.15.5

  • Linux Kernel 2.6.16

  • Linux Kernel 2.6.16.1

  • Linux Kernel 2.6.16.10

  • Linux Kernel 2.6.16.11

  • Linux Kernel 2.6.16.12

  • Linux Kernel 2.6.16.13

  • Linux Kernel 2.6.16.14

  • Linux Kernel 2.6.16.15

  • Linux Kernel 2.6.16.16

  • Linux Kernel 2.6.16.18

  • Linux Kernel 2.6.16.19

  • Linux Kernel 2.6.16.2

  • Linux Kernel 2.6.16.20

  • Linux Kernel 2.6.16.3

  • Linux Kernel 2.6.16.4

  • Linux Kernel 2.6.16.5

  • Linux Kernel 2.6.16.6

  • Linux Kernel 2.6.16.7

  • Linux Kernel 2.6.16.8

  • Linux Kernel 2.6.16.9

  • Linux Kernel 2.6.2

  • Linux Kernel 2.6.3

  • Linux Kernel 2.6.4

  • Linux Kernel 2.6.5

  • Linux Kernel 2.6.6

  • Linux Kernel 2.6.7

  • Linux Kernel 2.6.8

  • Linux Kernel 2.6.9


References

BID - 18616

CONFIRM - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194215

VUPEN - ADV-2006-2451

CONFIRM - http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21

CONFIRM - http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c85d1f9d358b24c5b05c3a2783a78423775a080

UBUNTU - USN-311-1

TRUSTIX - 2006-0037

BUGTRAQ - 20060623 rPSA-2006-0110-1 kernel

REDHAT - RHSA-2006:0575

SUSE - SUSE-SA:2006:047

SUSE - SUSE-SA:2006:042

CONFIRM - http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm

SECUNIA - 22417

SECUNIA - 21498

SECUNIA - 21465

SECUNIA - 21179

SECUNIA - 20991

SECUNIA - 20831

SECUNIA - 20703


Last Updated: 27 May 2016 10:42:28