Lucene search

K
nvd[email protected]NVD:CVE-2006-2451
HistoryJul 07, 2006 - 6:05 p.m.

CVE-2006-2451

2006-07-0718:05:00
CWE-399
web.nvd.nist.gov
6

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.3

Confidence

High

EPSS

0

Percentile

0.4%

The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.

Affected configurations

Nvd
Node
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.13.1
OR
linuxlinux_kernelMatch2.6.13.2
OR
linuxlinux_kernelMatch2.6.13.3
OR
linuxlinux_kernelMatch2.6.13.4
OR
linuxlinux_kernelMatch2.6.13.5
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14rc1
OR
linuxlinux_kernelMatch2.6.14rc2
OR
linuxlinux_kernelMatch2.6.14rc3
OR
linuxlinux_kernelMatch2.6.14rc4
OR
linuxlinux_kernelMatch2.6.14rc5
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.14.5
OR
linuxlinux_kernelMatch2.6.14.6
OR
linuxlinux_kernelMatch2.6.14.7
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15rc1
OR
linuxlinux_kernelMatch2.6.15rc2
OR
linuxlinux_kernelMatch2.6.15rc3
OR
linuxlinux_kernelMatch2.6.15rc4
OR
linuxlinux_kernelMatch2.6.15rc5
OR
linuxlinux_kernelMatch2.6.15rc6
OR
linuxlinux_kernelMatch2.6.15rc7
OR
linuxlinux_kernelMatch2.6.15.1
OR
linuxlinux_kernelMatch2.6.15.2
OR
linuxlinux_kernelMatch2.6.15.3
OR
linuxlinux_kernelMatch2.6.15.4
OR
linuxlinux_kernelMatch2.6.15.5
OR
linuxlinux_kernelMatch2.6.15.6
OR
linuxlinux_kernelMatch2.6.15.7
OR
linuxlinux_kernelMatch2.6.16
OR
linuxlinux_kernelMatch2.6.16rc1
OR
linuxlinux_kernelMatch2.6.16rc2
OR
linuxlinux_kernelMatch2.6.16rc3
OR
linuxlinux_kernelMatch2.6.16rc4
OR
linuxlinux_kernelMatch2.6.16rc5
OR
linuxlinux_kernelMatch2.6.16rc6
OR
linuxlinux_kernelMatch2.6.16.1
OR
linuxlinux_kernelMatch2.6.16.2
OR
linuxlinux_kernelMatch2.6.16.3
OR
linuxlinux_kernelMatch2.6.16.4
OR
linuxlinux_kernelMatch2.6.16.5
OR
linuxlinux_kernelMatch2.6.16.6
OR
linuxlinux_kernelMatch2.6.16.7
OR
linuxlinux_kernelMatch2.6.16.8
OR
linuxlinux_kernelMatch2.6.16.9
OR
linuxlinux_kernelMatch2.6.16.10
OR
linuxlinux_kernelMatch2.6.16.11
OR
linuxlinux_kernelMatch2.6.16.12
OR
linuxlinux_kernelMatch2.6.16.13
OR
linuxlinux_kernelMatch2.6.16.14
OR
linuxlinux_kernelMatch2.6.16.15
OR
linuxlinux_kernelMatch2.6.16.16
OR
linuxlinux_kernelMatch2.6.16.17
OR
linuxlinux_kernelMatch2.6.16.18
OR
linuxlinux_kernelMatch2.6.16.19
OR
linuxlinux_kernelMatch2.6.16.20
OR
linuxlinux_kernelMatch2.6.16.21
OR
linuxlinux_kernelMatch2.6.16.22
OR
linuxlinux_kernelMatch2.6.16.23
OR
linuxlinux_kernelMatch2.6.17
OR
linuxlinux_kernelMatch2.6.17rc1
OR
linuxlinux_kernelMatch2.6.17rc2
OR
linuxlinux_kernelMatch2.6.17rc3
OR
linuxlinux_kernelMatch2.6.17rc4
OR
linuxlinux_kernelMatch2.6.17rc5
OR
linuxlinux_kernelMatch2.6.17rc6
OR
linuxlinux_kernelMatch2.6.17.1
OR
linuxlinux_kernelMatch2.6.17.2
OR
linuxlinux_kernelMatch2.6.17.3
VendorProductVersionCPE
linuxlinux_kernel2.6.13cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
linuxlinux_kernel2.6.13.1cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
linuxlinux_kernel2.6.13.2cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
linuxlinux_kernel2.6.13.3cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
linuxlinux_kernel2.6.13.4cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
linuxlinux_kernel2.6.13.5cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*
linuxlinux_kernel2.6.14cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
linuxlinux_kernel2.6.14cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
linuxlinux_kernel2.6.14cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
linuxlinux_kernel2.6.14cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
Rows per page:
1-10 of 741

References

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.3

Confidence

High

EPSS

0

Percentile

0.4%