7.2
CVSSv2

CVE-2006-5753

Published: 30/01/2007 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 4.0

linux linux kernel 2.6.20.1

redhat enterprise linux desktop 4.0

Vendor Advisories

Mark Dowd discovered that the netfilter iptables module did not correcly handle fragmented IPv6 packets By sending specially crafted packets, a remote attacker could exploit this to bypass firewall rules This has has already been fixed for Ubuntu 610 in USN-395-1; this is the corresponding fix for Ubuntu 606(CVE-2006-4572) ...
CVE-2006-6060 CVE-2006-6106 CVE-2006-6535 CVE-2007-0958 CVE-2007-1357 CVE-2007-1592 Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code This update also fixes a regression in the smbfs subsystem which was introduced in DSA-1233 w ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2731 infamous41md reported multiple integer overflows in the Sbus PROM driver that would allo ...

References

NVD-CWE-Otherhttp://www.redhat.com/support/errata/RHSA-2007-0014.htmlhttp://lkml.org/lkml/2007/1/3/150http://support.avaya.com/elmodocs2/security/ASA-2007-063.htmhttps://issues.rpath.com/browse/RPL-1106http://fedoranews.org/cms/node/2739http://fedoranews.org/cms/node/2740http://www.novell.com/linux/security/advisories/2007_18_kernel.htmlhttp://www.novell.com/linux/security/advisories/2007_21_kernel.htmlhttp://www.ubuntu.com/usn/usn-416-1http://www.securityfocus.com/bid/22316http://secunia.com/advisories/23955http://secunia.com/advisories/23997http://secunia.com/advisories/24100http://secunia.com/advisories/24098http://secunia.com/advisories/24206http://secunia.com/advisories/24400http://secunia.com/advisories/24429http://secunia.com/advisories/24482http://secunia.com/advisories/24547http://www.novell.com/linux/security/advisories/2007_30_kernel.htmlhttp://www.securityfocus.com/archive/1/471457http://www.debian.org/security/2007/dsa-1304http://www.mandriva.com/security/advisories?name=MDKSA-2007:040http://www.mandriva.com/security/advisories?name=MDKSA-2007:060http://www.novell.com/linux/security/advisories/2007_35_kernel.htmlhttp://secunia.com/advisories/25683http://secunia.com/advisories/25714http://secunia.com/advisories/25691http://secunia.com/advisories/25226http://www.debian.org/security/2008/dsa-1503http://secunia.com/advisories/29058http://osvdb.org/33020https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371https://usn.ubuntu.com/416-1/https://nvd.nist.gov