CVE-2006-6730
https://notcve.org/view.php?id=CVE-2006-6730
OpenBSD and NetBSD permit usermode code to kill the display server and write to the X.Org /dev/xf86 device, which allows local users with root privileges to reduce securelevel by replacing the System Management Mode (SMM) handler via a write to an SMRAM address within /dev/xf86 (aka the video card memory-mapped I/O range), and then launching the new handler via a System Management Interrupt (SMI), as demonstrated by a write to Programmed I/O port 0xB2. OpenBSD y NetBSD permiten al código en modo de usuario matar el servidor de pantalla y escribir en dispositivo X.Org /dev/xf86, lo cual permite a usuarios locales con privilegios de root reducir el nivel de seguridad reemplazando el manejador del Modo de Administración de Sistema (System Management Mode o SMM) mediante una escritura a una dirección SMRAM dentro de /dev/xf86 (esto es el rango de E/S mapeado en memoria para la tarjeta de vídeo), y entonces lanzando el nuevo manejador mediante una Interrupción de Administración de Sistema (System Management Interrupt o SMI), tal y como se ha demostrado con una escritura al puerto de E/S Programada 0xB2. • http://lists.freedesktop.org/archives/xorg/2004-June/000927.html http://www.cansecwest.com/slides06/csw06-duflot.ppt http://www.securityfocus.com/archive/1/454379/100/0/threaded http://www.securityfocus.com/archive/1/454510/100/0/threaded http://www.securityfocus.com/archive/1/454706/100/0/threaded http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf •
CVE-2006-6397
https://notcve.org/view.php?id=CVE-2006-6397
Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operations. This issue is not a vulnerability ** IMPUGNADO ** Desbordamiento de entero en banner/banner.c de FreeBSD, NetBSD, y OpenBSD podría permitir a usuarios locales modificar la memoria mediante un banner largo. NOTA: CVE y múltiples terceras partes impugnan esta vulnerabilidad. Dado que banner no es un stuid, un exploit no podría cruzar límites de privilegios en operaciones normales. • http://www.securityfocus.com/archive/1/452322/100/200/threaded http://www.securityfocus.com/archive/1/452330/100/200/threaded http://www.securityfocus.com/archive/1/452374/100/200/threaded http://www.securityfocus.com/archive/1/452470/100/200/threaded •
CVE-2006-6164
https://notcve.org/view.php?id=CVE-2006-6164
The _dl_unsetenv function in loader.c in the ELF ld.so in OpenBSD 3.9 and 4.0 does not properly remove duplicate environment variables, which allows local users to pass dangerous variables such as LD_PRELOAD to loading processes, which might be leveraged to gain privileges. La función _dl_unsetenv en loader.c en el ELF ld.so en OpenBSD 3.9 y 4.0 no borra adecuadamente variables de entorno duplicadas, lo cual permite a usuarios locales pasar variables peligrosas como LD_PRELOAD a procesos de carga, lo cual puede ser utilizado para obtener privilegios. • http://secunia.com/advisories/22993 http://securitytracker.com/id?1017253 http://www.matasano.com/log/592/finger-79tcp-mcdonald-dowd-and-schuh-challenge-part-2 http://www.openbsd.org/errata.html#ldso http://www.openbsd.org/errata39.html#ldso http://www.securityfocus.com/archive/1/452371/100/0/threaded http://www.securityfocus.com/archive/1/452428/100/0/threaded http://www.securityfocus.com/bid/21188 https://exchange.xforce.ibmcloud.com/vulnerabilities/30441 •
CVE-2006-5794 – OpenSSH privilege separation flaw
https://notcve.org/view.php?id=CVE-2006-5794
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist. Vulnerabilidad sin especificar en el sshd Privilege Separation Monitor en OpenSSH para versiones anteriores a la 4.5 que provoca una verificación más leve que la autenticación, y que podría permitir a atacantes remotos evitar la autenticación. NOTA: en el 20061108, se cree que es sólo explotada por el impulso de vulnerabilidades en un proceso sin privilegios, hasta ahora desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc http://rhn.redhat.com/errata/RHSA-2006-0738.html http://secunia.com/advisories/22771 http://secunia.com/advisories/22772 http://secunia.com/advisories/22773 http://secunia.com/advisories/22778 http://secunia.com/advisories/22814 http://secunia.com/advisories/22872 http://secunia.com/advisories/22932 http://secunia.com/advisories/23513 http://secunia.com/advisories/23680 http://secunia.com/advisories •
CVE-2006-5550 – FreeBSD 6.1 - '/dev/crypto' Local Kernel Denial of Service
https://notcve.org/view.php?id=CVE-2006-5550
The kernel in FreeBSD 6.1 and OpenBSD 4.0 allows local users to cause a denial of service via unspecified vectors involving certain ioctl requests to /dev/crypto. El núcleo en FreeBSD 6.1 y OpenBSD 4.0 permite a usuarios locales provocar una denegación de servicio mediante vectores sin especificar relativas a peticiones concretas ioctl al /dev/crypto. • https://www.exploit-db.com/exploits/2639 http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html http://secunia.com/advisories/22543 http://www.securityfocus.com/bid/20713 •