7.2
CVSSv2

CVE-2006-0096

Published: 06/01/2006 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

wan/sdla.c in Linux kernel 2.6.x prior to 2.6.11 and 2.4.x prior to 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exploit, since it is protected by CAP_NET_ADMIN; thus it might not be a vulnerability, although capabilities provide finer distinctions between privilege levels.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.4.18

linux linux kernel 2.4.15

linux linux kernel 2.6.11

linux linux kernel 2.6.14

linux linux kernel 2.4.0

linux linux kernel 2.6.11.2

linux linux kernel 2.6.5

linux linux kernel 2.4.11

linux linux kernel 2.6.11.10

linux linux kernel 2.6.1

linux linux kernel 2.4.27

linux linux kernel 2.6.13

linux linux kernel 2.6.15

linux linux kernel 2.6.11.8

linux linux kernel 2.4.26

linux linux kernel 2.6.14.4

linux linux kernel 2.4.19

linux linux kernel 2.4.21

linux linux kernel 2.6.10

linux linux kernel 2.4.12

linux linux kernel 2.6.14.3

linux linux kernel 2.4.13

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.3

linux linux kernel 2.4.17

linux linux kernel 2.6.4

linux linux kernel 2.6.11.5

linux linux kernel 2.4.23_ow2

linux linux kernel 2.4.23

linux linux kernel 2.6.2

linux linux kernel 2.4.7

linux linux kernel 2.4.25

linux linux kernel 2.6.8

linux linux kernel 2.6.14.1

linux linux kernel 2.4.24

linux linux kernel 2.4.9

linux linux kernel 2.6.12.1

linux linux kernel 2.6.11.9

linux linux kernel 2.4.28

linux linux kernel 2.6.0

linux linux kernel 2.4.24_ow1

linux linux kernel 2.4.10

linux linux kernel 2.6.12.2

linux linux kernel 2.4.2

linux linux kernel 2.4.16

linux linux kernel 2.4.8

linux linux kernel 2.4.14

linux linux kernel 2.6.12.4

linux linux kernel 2.6.11.3

linux linux kernel 2.6.12.3

linux linux kernel 2.4.22

linux linux kernel 2.4.5

linux linux kernel 2.6.7

linux linux kernel 2.6.9

linux linux kernel 2.4.3

linux linux kernel 2.6.11.7

linux linux kernel 2.4.1

linux linux kernel 2.4.4

linux linux kernel 2.6.14.2

linux linux kernel 2.4.6

linux linux kernel 2.6.8.1

linux linux kernel 2.6.11.4

linux linux kernel 2.4.20

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.1

linux linux kernel 2.6.6

linux linux kernel 2.6.12

Vendor Advisories

Doug Chapman discovered a flaw in the reference counting in the sys_mq_open() function By calling this function in a special way, a local attacker could exploit this to cause a kernel crash (CVE-2005-3356) ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-1017 Multiple overflows exist in the io_edgeport driver which might be usable as a denial of ...