7.2
CVSSv2

CVE-2006-5751

Published: 02/12/2006 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel prior to 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.6.8.1.5

linux linux kernel 2.6.4

linux linux kernel 2.6.17

linux linux kernel 2.6.18

linux linux kernel 2.6.16.16

linux linux kernel 2.6.17.12

linux linux kernel 2.6.16.9

linux linux kernel 2.6.12

linux linux kernel 2.6.17.9

linux linux kernel 2.6.14

linux linux kernel 2.6.11.2

linux linux kernel 2.6.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.11.10

linux linux kernel 2.6.10

linux linux kernel 2.6.13

linux linux kernel 2.6.1

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16

linux linux kernel 2.6.7

linux linux kernel 2.6.14.7

linux linux kernel 2.6.3

linux linux kernel 2.6.17.2

linux linux kernel 2.6.15

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11_rc1_bk6

linux linux kernel 2.6.17.8

linux linux kernel 2.6.14.4

linux linux kernel 2.6.17.4

linux linux kernel 2.6.16.18

linux linux kernel 2.6.17.14

linux linux kernel 2.6.14.3

linux linux kernel 2.6.18.3

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.16.13

linux linux kernel 2.6.9

linux linux kernel 2.6.16.4

linux linux kernel 2.6.17.3

linux linux kernel 2.6.16.15

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.16.1

linux linux kernel 2.6.18.1

linux linux kernel 2.6.8

linux linux kernel 2.6.2

linux linux kernel 2.6.6

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.17.5

linux linux kernel 2.6.16.32

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.28

linux linux kernel 2.6.17.10

linux linux kernel 2.6.14.1

linux linux kernel 2.6.16.23

linux linux kernel 2.6.12.5

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16.3

linux linux kernel 2.6.14.6

linux linux kernel 2.6.12.1

linux linux kernel 2.6.11.9

linux linux kernel 2.6.17.1

linux linux kernel 2.6.0

linux linux kernel 2.6.13.4

linux linux kernel 2.6.12.2

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.26

linux linux kernel 2.6.18.2

linux linux kernel 2.6.16.29

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.22

linux linux kernel 2.6.17.11

linux linux kernel 2.6.16.10

linux linux kernel 2.6.12.4

linux linux kernel 2.6.11.3

linux linux kernel 2.6.16.24

linux linux kernel 2.6.12.3

linux linux kernel 2.6.16.30

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.27

linux linux kernel 2.6.12.6

linux linux kernel 2.6.17.7

linux linux kernel 2.6.11.7

linux linux kernel 2.6.16.2

linux linux kernel 2.6.14.2

linux linux kernel 2.6.17.6

linux linux kernel 2.6.16.7

linux linux kernel 2.6.17.13

linux linux kernel 2.6.8.1

linux linux kernel 2.6.16.5

linux linux kernel 2.6.11.4

linux linux kernel 2.6.16.19

linux linux kernel 2.6.11.12

linux linux kernel 2.6.16.20

linux linux kernel 2.6.15.5

linux linux kernel 2.6.11.1

linux linux kernel 2.6.13.1

Vendor Advisories

Mark Dowd discovered that the netfilter iptables module did not correcly handle fragmented packets By sending specially crafted packets, a remote attacker could exploit this to bypass firewall rules This has only be fixed for Ubuntu 610; the corresponding fix for Ubuntu 510 and 606 will follow soon (CVE-2006-4572) ...

References

NVD-CWE-Otherhttp://projects.info-pull.com/mokb/MOKB-29-11-2006.htmlhttp://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18.4http://www.securityfocus.com/bid/21353https://issues.rpath.com/browse/RPL-803https://issues.rpath.com/browse/RPL-837http://secunia.com/advisories/23252http://www.us.debian.org/security/2006/dsa-1233http://www.ubuntu.com/usn/usn-395-1http://secunia.com/advisories/23370http://secunia.com/advisories/23384http://www.novell.com/linux/security/advisories/2006_79_kernel.htmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:002http://secunia.com/advisories/23593http://support.avaya.com/elmodocs2/security/ASA-2007-063.htmhttp://rhn.redhat.com/errata/RHSA-2007-0014.htmlhttp://www.novell.com/linux/security/advisories/2007_21_kernel.htmlhttp://secunia.com/advisories/23752http://secunia.com/advisories/23997http://secunia.com/advisories/24206http://secunia.com/advisories/24547http://www.mandriva.com/security/advisories?name=MDKSA-2007:012http://secunia.com/advisories/23474http://www.vupen.com/english/advisories/2006/4781http://secunia.com/advisories/23073https://exchange.xforce.ibmcloud.com/vulnerabilities/30588https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10151http://www.securityfocus.com/archive/1/453681/100/0/threadedhttp://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ba8379b220509e9448c00a77cf6c15ac2a559cc7http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=4c61a7e0a86e1ae9e16867f9f8e4b0412b8edbaf%3Bhp=4e4119a1213925568b8a1acdef9bf52b98b19da3%3Bhb=ba8379b220509e9448c00a77cf6c15ac2a559cc7%3Bf=net/bridge/br_ioctl.chttps://nvd.nist.govhttps://usn.ubuntu.com/395-1/