7.8
CVSSv2

CVE-2006-2444

Published: 25/05/2006 Updated: 13/02/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The snmp_trap_decode function in the SNMP NAT helper for Linux kernel prior to 2.6.16.18 allows remote malicious users to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.6.8.1.5

linux linux kernel 2.6.0

linux linux kernel 2.6.4

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.9

linux linux kernel 2.6.12

linux linux kernel 2.6.14

linux linux kernel 2.6.11.2

linux linux kernel 2.6.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.11.10

linux linux kernel 2.6.10

linux linux kernel 2.6.13

linux linux kernel 2.6.1

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16

linux linux kernel 2.6.7

linux linux kernel 2.6.14.7

linux linux kernel 2.6.3

linux linux kernel 2.6.15

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11_rc1_bk6

linux linux kernel 2.6.14.4

linux linux kernel 2.6.14.3

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.16.13

linux linux kernel 2.6.9

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.15

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.16.1

linux linux kernel 2.6.8

linux linux kernel 2.6.2

linux linux kernel 2.6.6

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.14

linux linux kernel 2.6.14.1

linux linux kernel 2.6.12.5

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16.3

linux linux kernel 2.6.14.6

linux linux kernel 2.6.12.1

linux linux kernel 2.6.11.9

linux linux kernel 2.6.13.4

linux linux kernel 2.6.12.2

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.10

linux linux kernel 2.6.12.4

linux linux kernel 2.6.11.3

linux linux kernel 2.6.12.3

linux linux kernel 2.6.16_rc7

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.12

linux linux kernel 2.6.12.6

linux linux kernel 2.6.11.7

linux linux kernel 2.6.16.2

linux linux kernel 2.6.14.2

linux linux kernel 2.6.16.7

linux linux kernel 2.6.8.1

linux linux kernel 2.6.16.5

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11.12

linux linux kernel 2.6.15.5

linux linux kernel 2.6.11.1

linux linux kernel 2.6.13.1

Vendor Advisories

An integer overflow was discovered in the do_replace() function A local user process with the CAP_NET_ADMIN capability could exploit this to execute arbitrary commands with full root privileges However, none of Ubuntu’s supported packages use this capability with any non-root user, so this only affects you if you use some third party software l ...
This advisory covers the S/390 components of the recent security update for the Linux 268 kernel that were missing due to technical problems For reference, please see the text of the original advisory Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitr ...

Exploits

/* * ecl-nf-snmpwnc - 30/05/06 * * Alex Behar <alex@ecl-labsorg> * Yuri Gushin <yuri@ecl-labsorg> * * A patch review we did on the 261617->18 Linux kernel source tree revealed * a restructuring of code in the snmp_parse_mangle() and the snmp_trap_decode() * functions After further research it turned out to be a v ...
Netfilter NAT SNMP module denial of service exploit This vulnerability has been patched in 261618 ...

References

NVD-CWE-Otherhttp://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18http://secunia.com/advisories/20225http://www.securityfocus.com/bid/18081http://secunia.com/advisories/20182http://securitytracker.com/id?1016153http://www.kb.cert.org/vuls/id/681569http://www.ubuntu.com/usn/usn-302-1http://secunia.com/advisories/20716http://www.redhat.com/support/errata/RHSA-2006-0580.htmlhttp://secunia.com/advisories/21035http://www.redhat.com/support/errata/RHSA-2006-0437.htmlhttp://secunia.com/advisories/21136http://www.novell.com/linux/security/advisories/2006_42_kernel.htmlhttp://secunia.com/advisories/21179http://www.novell.com/linux/security/advisories/2006_47_kernel.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0617.htmlhttp://secunia.com/advisories/21605http://support.avaya.com/elmodocs2/security/ASA-2006-180.htmhttp://secunia.com/advisories/21983http://www.debian.org/security/2006/dsa-1183http://www.debian.org/security/2006/dsa-1184http://secunia.com/advisories/22082http://secunia.com/advisories/22093http://support.avaya.com/elmodocs2/security/ASA-2006-203.htmhttp://secunia.com/advisories/22174http://www.novell.com/linux/security/advisories/2006_64_kernel.htmlhttp://www.osvdb.org/25750http://secunia.com/advisories/22822http://secunia.com/advisories/21498http://www.mandriva.com/security/advisories?name=MDKSA-2006:087http://www.vupen.com/english/advisories/2006/1916https://exchange.xforce.ibmcloud.com/vulnerabilities/26594https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11318http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1db6b5a66e93ff125ab871d6b3f7363412cc87e8https://usn.ubuntu.com/302-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/1880/https://www.kb.cert.org/vuls/id/681569