2.1
CVSSv2

CVE-2006-2071

Published: 27/04/2006 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.4.18

linux linux kernel 2.4.15

linux linux kernel 2.4.30

linux linux kernel 2.6.12

linux linux kernel 2.6.14

linux linux kernel 2.4.0

linux linux kernel 2.6.5

linux linux kernel 2.6.15.3

linux linux kernel 2.4.11

linux linux kernel 2.6.1

linux linux kernel 2.4.32

linux linux kernel 2.4.33

linux linux kernel 2.4.27

linux linux kernel 2.6.13

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.4.26

linux linux kernel 2.6.14.4

linux linux kernel 2.4.19

linux linux kernel 2.4.21

linux linux kernel 2.6.10

linux linux kernel 2.4.12

linux linux kernel 2.6.14.3

linux linux kernel 2.4.13

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.0

linux linux kernel 2.6.3

linux linux kernel 2.4.17

linux linux kernel 2.6.4

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.7

linux linux kernel 2.4.23_ow2

linux linux kernel 2.4.23

linux linux kernel 2.4.29

linux linux kernel 2.6.2

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.8

linux linux kernel 2.4.7

linux linux kernel 2.4.25

linux linux kernel 2.6.15

linux linux kernel 2.6.14.1

linux linux kernel 2.4.24

linux linux kernel 2.4.9

linux linux kernel 2.6.12.5

linux linux kernel 2.4.31

linux linux kernel 2.6.12.1

linux linux kernel 2.4.28

linux linux kernel 2.6.13.4

linux linux kernel 2.4.24_ow1

linux linux kernel 2.4.10

linux linux kernel 2.6.12.2

linux linux kernel 2.4.2

linux linux kernel 2.4.16

linux linux kernel 2.4.8

linux linux kernel 2.4.14

linux linux kernel 2.6.16

linux linux kernel 2.6.15.2

linux linux kernel 2.6.12.4

linux linux kernel 2.6.12.3

linux linux kernel 2.4.22

linux linux kernel 2.4.5

linux linux kernel 2.6.15.4

linux linux kernel 2.6.6

linux linux kernel 2.6.9

linux linux kernel 2.6.12.6

linux linux kernel 2.4.3

linux linux kernel 2.6.11.7

linux linux kernel 2.4.1

linux linux kernel 2.4.4

linux linux kernel 2.6.14.2

linux linux kernel 2.4.6

linux linux kernel 2.4.20

linux linux kernel 2.6.11.12

linux linux kernel 2.6.15.5

linux linux kernel 2.6.13.1

Vendor Advisories

An integer overflow was discovered in the do_replace() function A local user process with the CAP_NET_ADMIN capability could exploit this to execute arbitrary commands with full root privileges However, none of Ubuntu’s supported packages use this capability with any non-root user, so this only affects you if you use some third party software l ...

References

NVD-CWE-Otherhttp://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190073http://secunia.com/advisories/20157http://www.ubuntu.com/usn/usn-302-1http://secunia.com/advisories/20716http://www.osvdb.org/25139http://www.redhat.com/support/errata/RHSA-2006-0579.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0580.htmlhttp://secunia.com/advisories/21035http://www.redhat.com/support/errata/RHSA-2006-0689.htmlhttp://secunia.com/advisories/22292http://www.redhat.com/support/errata/RHSA-2006-0710.htmlhttp://secunia.com/advisories/22497http://support.avaya.com/elmodocs2/security/ASA-2006-249.htmhttp://secunia.com/advisories/22945http://support.avaya.com/elmodocs2/security/ASA-2006-254.htmhttp://www.vmware.com/download/esx/esx-202-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-213-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-254-200610-patch.htmlhttp://secunia.com/advisories/22875http://secunia.com/advisories/23064http://www.mandriva.com/security/advisories?name=MDKSA-2006:086http://www.vupen.com/english/advisories/2006/1391http://www.vupen.com/english/advisories/2006/4502https://exchange.xforce.ibmcloud.com/vulnerabilities/26169https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9978http://www.securityfocus.com/archive/1/451426/100/200/threadedhttp://www.securityfocus.com/archive/1/451419/100/200/threadedhttp://www.securityfocus.com/archive/1/451417/100/200/threadedhttp://www.securityfocus.com/archive/1/451404/100/0/threadedhttp://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b78b6af66a5fbaf17d7e6bfc32384df5e34408c8https://usn.ubuntu.com/302-1/https://nvd.nist.gov