4.6
CVSSv2

CVE-2006-1864

Published: 26/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 465
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in smbfs in Linux 2.6.16 and previous versions allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.16

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16_rc7

Vendor Advisories

An integer overflow was discovered in the do_replace() function A local user process with the CAP_NET_ADMIN capability could exploit this to execute arbitrary commands with full root privileges However, none of Ubuntu’s supported packages use this capability with any non-root user, so this only affects you if you use some third party software l ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-3359 Franz Filz discovered that some socket calls permit causing inconsistent reference count ...

Exploits

source: wwwsecurityfocuscom/bid/17735/info The Linux Kernel is prone to a vulnerability that allows attackers to bypass a security restriction This issue is due to a failure in the kernel to properly sanitize user-supplied data The problem affects chroot inside of an SMB-mounted filesystem ('smbfs') A local attacker who is bounded by ...

References

NVD-CWE-Otherhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189435http://www.securityfocus.com/bid/17735http://secunia.com/advisories/19869http://www.osvdb.org/25067http://www.trustix.org/errata/2006/0026http://www.redhat.com/support/errata/RHSA-2006-0493.htmlhttp://secunia.com/advisories/20237http://www.debian.org/security/2006/dsa-1097http://secunia.com/advisories/20671http://www.novell.com/linux/security/advisories/2006-05-31.htmlhttp://www.ubuntu.com/usn/usn-302-1http://secunia.com/advisories/20716http://www.debian.org/security/2006/dsa-1103http://secunia.com/advisories/20914http://www.redhat.com/support/errata/RHSA-2006-0579.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0580.htmlhttp://secunia.com/advisories/21035http://secunia.com/advisories/21614http://support.avaya.com/elmodocs2/security/ASA-2006-161.htmhttp://secunia.com/advisories/21745http://secunia.com/advisories/20398http://www.redhat.com/support/errata/RHSA-2006-0710.htmlhttp://secunia.com/advisories/22497http://support.avaya.com/elmodocs2/security/ASA-2006-254.htmhttp://www.vmware.com/download/esx/esx-202-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-213-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-254-200610-patch.htmlhttp://secunia.com/advisories/22875http://secunia.com/advisories/23064http://secunia.com/advisories/21476http://www.mandriva.com/security/advisories?name=MDKSA-2006:150http://www.mandriva.com/security/advisories?name=MDKSA-2006:151http://www.vupen.com/english/advisories/2006/4502http://www.vupen.com/english/advisories/2006/2554https://exchange.xforce.ibmcloud.com/vulnerabilities/26137https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11327http://www.securityfocus.com/archive/1/451426/100/200/threadedhttp://www.securityfocus.com/archive/1/451419/100/200/threadedhttp://www.securityfocus.com/archive/1/451417/100/200/threadedhttp://www.securityfocus.com/archive/1/451404/100/0/threadedhttps://usn.ubuntu.com/302-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/27766/