7.8
CVSSv2

CVE-2006-2936

Published: 10/07/2006 Updated: 13/02/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.6.4

linux linux kernel 2.6.17

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.9

linux linux kernel 2.6.12

linux linux kernel 2.6.14

linux linux kernel 2.6.11.2

linux linux kernel 2.6.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.11.10

linux linux kernel 2.6.10

linux linux kernel 2.6.13

linux linux kernel 2.6.1

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16

linux linux kernel 2.6.7

linux linux kernel 2.6.14.7

linux linux kernel 2.6.3

linux linux kernel 2.6.15

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.6.14.4

linux linux kernel 2.6.16.18

linux linux kernel 2.6.14.3

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.16.13

linux linux kernel 2.6.9

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.15

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.16.1

linux linux kernel 2.6.8

linux linux kernel 2.6.2

linux linux kernel 2.6.6

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.5

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.28

linux linux kernel 2.6.14.1

linux linux kernel 2.6.16.23

linux linux kernel 2.6.12.5

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16.3

linux linux kernel 2.6.14.6

linux linux kernel 2.6.12.1

linux linux kernel 2.6.11.9

linux linux kernel 2.6.0

linux linux kernel 2.6.13.4

linux linux kernel 2.6.12.2

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.26

linux linux kernel 2.6.16.29

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.10

linux linux kernel 2.6.12.4

linux linux kernel 2.6.11.3

linux linux kernel 2.6.16.24

linux linux kernel 2.6.12.3

linux linux kernel 2.6.16.30

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.27

linux linux kernel 2.6.12.6

linux linux kernel 2.6.11.7

linux linux kernel 2.6.16.2

linux linux kernel 2.6.14.2

linux linux kernel 2.6.16.7

linux linux kernel 2.6.8.1

linux linux kernel 2.6.16.5

linux linux kernel 2.6.11.4

linux linux kernel 2.6.16.19

linux linux kernel 2.6.11.12

linux linux kernel 2.6.16.20

linux linux kernel 2.6.15.5

linux linux kernel 2.6.11.1

linux linux kernel 2.6.13.1

Vendor Advisories

A Denial of service vulnerability was reported in iptables’ SCTP conntrack module On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash (CVE-2006-2934) ...
A Denial of service vulnerability was reported in iptables’ SCTP conntrack module On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash (CVE-2006-2934) ...
This advisory covers the S/390 components of the recent security update for the Linux 268 kernel that were missing due to technical problems For reference, please see the text of the original advisory Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitr ...

References

CWE-399https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197610http://www.securityfocus.com/bid/19033http://secunia.com/advisories/20703http://www.osvdb.org/27119http://secunia.com/advisories/21057http://secunia.com/advisories/21298http://www.ubuntu.com/usn/usn-331-1http://www.redhat.com/support/errata/RHSA-2006-0617.htmlhttp://secunia.com/advisories/21605http://secunia.com/advisories/21614http://www.ubuntu.com/usn/usn-346-1http://www.debian.org/security/2006/dsa-1184http://secunia.com/advisories/22093http://support.avaya.com/elmodocs2/security/ASA-2006-203.htmhttp://secunia.com/advisories/22174http://secunia.com/advisories/21934http://www.novell.com/linux/security/advisories/2007_18_kernel.htmlhttp://www.novell.com/linux/security/advisories/2007_21_kernel.htmlhttp://secunia.com/advisories/24547http://www.novell.com/linux/security/advisories/2007_30_kernel.htmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:150http://www.mandriva.com/security/advisories?name=MDKSA-2006:151http://www.novell.com/linux/security/advisories/2007_35_kernel.htmlhttp://secunia.com/advisories/25683http://secunia.com/advisories/25226http://www.vupen.com/english/advisories/2006/2841https://exchange.xforce.ibmcloud.com/vulnerabilities/27807https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10265http://www.securityfocus.com/archive/1/440300/100/0/threadedhttp://www.kernel.org/git/?p=linux/kernel/git/gregkh/patches.git%3Ba=blob%3Bh=4b4d9cfea17618b80d3ac785b701faeaf60141f1%3Bhb=396eb2aac550ec55856c6843ef9017e800c3d656https://nvd.nist.govhttps://usn.ubuntu.com/331-1/