CVE-2006-1343
VMware Security Advisory 2006-0007
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory.
net/ipv4/netfilter/ip_conntrack_core.c en el kernel de Linux 2.4 y 2.6 y posiblemente net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c en 2.6, no aclara sockaddr_in.sin_zero antes de devolver los nombres de socket IPv4 desde la función getsockopt con SO_ORIGINAL_DST, lo que permite a usuarios locales obtener porciones de memoria potencialmente sensible.
Multiple vulnerabilities have been discovered in the Linux 2.6 kernel. The sys_mbind() function did not properly verify the validity of the 'maxnod' argument. A local user could exploit this to trigger a buffer overflow, which caused a kernel crash. The SELinux module did not correctly handle the tracer SID when a process was already being traced. A local attacker could exploit this to cause a kernel crash. Al Viro discovered a local Denial of Service in the sysfs write buffer handling. By writing a block wit h a length exactly equal to the processor's page size to any writable file in /sys, a local attacker could cause a kernel crash. John Blackwood discovered a race condition with single-step debugging multiple processes at the same time. A local attacker could exploit this to crash the system. This only affects the amd64 platform. Marco Ivaldi discovered a flaw in the handling of the ID number of IP packets. This number was incremented after receiving unsolicited TCP SYN-ACK packets. A remote attacker could exploit this to conduct port scans with the 'Idle scan' method (nmap -sI), which bypassed intended port scan protections. Pavel Kankovsky discovered that the getsockopt() function, when called with an SO_ORIGINAL_DST argument, does not properly clear the returned structure, so that a random piece of kernel memory is exposed to the user. This could potentially reveal sensitive data like passwords or encryption keys. A buffer overflow was discovered in the USB Gadget RNDIS implementation. While creating a reply message, the driver did not allocate enough memory for the reply structure. A remote attacker could exploit this to cause a kernel crash. Alexandra Kossovsky discovered an invalid memory access in the ip_route_input() function. By using the 'ip' command in a particular way to retrieve multicast routes, a local attacker could exploit this to crash the kernel.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-03-21 CVE Reserved
- 2006-03-21 CVE Published
- 2024-08-07 CVE Updated
- 2025-06-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (39)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2006/dsa-1097 | 2023-11-07 | |
http://www.debian.org/security/2006/dsa-1184 | 2023-11-07 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 | 2023-11-07 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150 | 2023-11-07 | |
http://www.redhat.com/support/errata/RHSA-2006-0437.html | 2023-11-07 | |
http://www.redhat.com/support/errata/RHSA-2006-0575.html | 2023-11-07 | |
http://www.redhat.com/support/errata/RHSA-2006-0579.html | 2023-11-07 | |
http://www.redhat.com/support/errata/RHSA-2006-0580.html | 2023-11-07 | |
http://www.trustix.org/errata/2006/0032 | 2023-11-07 | |
https://usn.ubuntu.com/281-1 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2006-1343 | 2006-07-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1618033 | 2006-07-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.4.0 Search vendor "Linux" for product "Linux Kernel" and version "2.4.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.0 Search vendor "Linux" for product "Linux Kernel" and version "2.6.0" | - |
Affected
|