CVE-2006-5749
Mandriva Linux Security Advisory 2007.012
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.
La función isdn_ppp_ccp_reset_alloc_state en el drivers/isdn/isdn_ppp.c del kernel del Linu 2.4 anterior al 2.4.34-rc4 no llama a la función init_timer para restaurar el estado del temporizador ISDN PPP CCP, lo cual genera vectores de ataque desconocidos y, como resultado, la caída del sistema.
The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4, as well as the 2.6 kernel, does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash. The listxattr syscall can corrupt user space under certain circumstances. The problem seems to be related to signed/unsigned conversion during size promotion. The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures. The mincore function in the Linux kernel before 2.4.33.6, as well as the 2.6 kernel, does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-11-06 CVE Reserved
- 2006-12-31 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34 | X_refsource_confirm | |
http://secunia.com/advisories/23609 | Third Party Advisory | |
http://secunia.com/advisories/23752 | Third Party Advisory | |
http://secunia.com/advisories/24098 | Third Party Advisory | |
http://secunia.com/advisories/24100 | Third Party Advisory | |
http://secunia.com/advisories/24547 | Third Party Advisory | |
http://secunia.com/advisories/25226 | Third Party Advisory | |
http://secunia.com/advisories/25683 | Third Party Advisory | |
http://secunia.com/advisories/25691 | Third Party Advisory | |
http://www.kernel.org/git/?p=linux/kernel/git/wtarreau/linux-2.4.git%3Ba=commitdiff%3Bh=05dca9b77f99d80cf615075624666106d5b61727 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/471457 | Mailing List | |
http://www.securityfocus.com/bid/21835 | Vdb Entry | |
http://www.securityfocus.com/bid/21883 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/23529 | 2023-02-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 2.4.34 Search vendor "Linux" for product "Linux Kernel" and version " <= 2.4.34" | rc3 |
Affected
|