4.9
CVSSv2

CVE-2006-0744

Published: 18/04/2006 Updated: 30/10/2018
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Linux kernel prior to 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.6.11.1

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12.2

linux linux kernel 2.6.12

linux linux kernel 2.6.10

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.3

linux linux kernel 2.6.13

linux linux kernel 2.6.14

linux linux kernel 2.6.14.7

linux linux kernel 2.6.15.2

linux linux kernel 2.6.15.3

linux linux kernel 2.6.15

linux linux kernel 2.6.11.2

linux linux kernel 2.6.11.3

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.6

linux linux kernel 2.6.13.1

linux linux kernel 2.6.14.5

linux linux kernel 2.6.14.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16_rc7

linux linux kernel 2.6.2

linux linux kernel 2.6.3

linux linux kernel 2.6.4

linux linux kernel 2.6.5

linux linux kernel 2.6.6

linux linux kernel 2.6.7

linux linux kernel 2.6.8

linux linux kernel 2.6.9

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11.9

linux linux kernel 2.6.12.3

linux linux kernel 2.6.12.4

linux linux kernel 2.6.14.3

linux linux kernel 2.6.14.4

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.13.4

linux linux kernel 2.6.14.1

linux linux kernel 2.6.14.2

linux linux kernel 2.6.15.4

linux linux kernel 2.6.15.5

Vendor Advisories

An integer overflow was discovered in the do_replace() function A local user process with the CAP_NET_ADMIN capability could exploit this to execute arbitrary commands with full root privileges However, none of Ubuntu’s supported packages use this capability with any non-root user, so this only affects you if you use some third party software l ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-3359 Franz Filz discovered that some socket calls permit causing inconsistent reference count ...

References

CWE-20http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5http://secunia.com/advisories/19639http://www.securityfocus.com/bid/17541http://www.osvdb.org/24639http://secunia.com/advisories/19735http://secunia.com/advisories/20157http://www.redhat.com/support/errata/RHSA-2006-0493.htmlhttp://secunia.com/advisories/20237http://www.novell.com/linux/security/advisories/2006-05-31.htmlhttp://www.ubuntu.com/usn/usn-302-1http://secunia.com/advisories/20716http://www.debian.org/security/2006/dsa-1103http://secunia.com/advisories/20914http://www.redhat.com/support/errata/RHSA-2006-0437.htmlhttp://secunia.com/advisories/21136http://www.novell.com/linux/security/advisories/2006_42_kernel.htmlhttp://secunia.com/advisories/21179http://www.novell.com/linux/security/advisories/2006_47_kernel.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2006-161.htmhttp://secunia.com/advisories/21745http://secunia.com/advisories/20398http://support.avaya.com/elmodocs2/security/ASA-2006-180.htmhttp://secunia.com/advisories/21983http://lwn.net/Alerts/180820/http://secunia.com/advisories/21498http://www.mandriva.com/security/advisories?name=MDKSA-2006:086http://www.mandriva.com/security/advisories?name=MDKSA-2006:150http://www.vupen.com/english/advisories/2006/1390http://www.vupen.com/english/advisories/2006/1475http://www.vupen.com/english/advisories/2006/2554https://exchange.xforce.ibmcloud.com/vulnerabilities/25869https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732https://usn.ubuntu.com/302-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/649219