4.6
CVSSv2

CVE-2006-2935

Published: 05/07/2006 Updated: 28/08/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 3.1

canonical ubuntu linux 5.04

canonical ubuntu linux 5.10

canonical ubuntu linux 6.06

Vendor Advisories

A Denial of service vulnerability was reported in iptables’ SCTP conntrack module On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash (CVE-2006-2934) ...
A Denial of service vulnerability was reported in iptables’ SCTP conntrack module On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash (CVE-2006-2934) ...
This advisory covers the S/390 components of the recent security update for the Linux 268 kernel that were missing due to technical problems For reference, please see the text of the original advisory Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitr ...

References

CWE-120https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197670http://bugzilla.kernel.org/show_bug.cgi?id=2966http://www.securityfocus.com/bid/18847http://www.novell.com/linux/security/advisories/2006_42_kernel.htmlhttp://secunia.com/advisories/21179http://secunia.com/advisories/21298http://www.ubuntu.com/usn/usn-331-1http://www.novell.com/linux/security/advisories/2006_47_kernel.htmlhttp://www.novell.com/linux/security/advisories/2006_49_kernel.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0617.htmlhttp://secunia.com/advisories/21605http://secunia.com/advisories/21614http://www.ubuntu.com/usn/usn-346-1https://issues.rpath.com/browse/RPL-611http://secunia.com/advisories/21695http://www.debian.org/security/2006/dsa-1183http://www.debian.org/security/2006/dsa-1184http://secunia.com/advisories/22082http://secunia.com/advisories/22093http://support.avaya.com/elmodocs2/security/ASA-2006-203.htmhttp://secunia.com/advisories/22174http://www.redhat.com/support/errata/RHSA-2006-0710.htmlhttp://secunia.com/advisories/22497http://www.novell.com/linux/security/advisories/2006_64_kernel.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2006-254.htmhttp://secunia.com/advisories/23064http://secunia.com/advisories/21934http://support.avaya.com/elmodocs2/security/ASA-2007-078.htmhttp://www.redhat.com/support/errata/RHSA-2007-0012.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0013.htmlhttp://secunia.com/advisories/23788http://secunia.com/advisories/22822http://secunia.com/advisories/21498http://secunia.com/advisories/24288http://www.mandriva.com/security/advisories?name=MDKSA-2006:150http://www.mandriva.com/security/advisories?name=MDKSA-2006:151http://www.vupen.com/english/advisories/2006/2680https://exchange.xforce.ibmcloud.com/vulnerabilities/27579https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10886http://www.securityfocus.com/archive/1/444887/100/0/threadedhttps://usn.ubuntu.com/331-1/https://nvd.nist.gov