7.5
CVSSv2

CVE-2006-6106

Published: 19/12/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 prior to 2.6.18.6, and 2.6.19.x, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.4.27

linux linux kernel 2.4.26

linux linux kernel 2.4.33

linux linux kernel 2.4.33.1

linux linux kernel 2.4.23

linux linux kernel 2.4.22

linux linux kernel 2.4.30

linux linux kernel 2.4.33.4

linux linux kernel 2.4.25

linux linux kernel 2.4.24

linux linux kernel 2.4.33.2

linux linux kernel 2.4.33.3

linux linux kernel 2.4.29

linux linux kernel 2.4.28

linux linux kernel 2.4.31

linux linux kernel 2.4.32

linux linux kernel 2.6.2

linux linux kernel 2.6.4

linux linux kernel 2.6.6

linux linux kernel 2.6.3

linux linux kernel 2.6.5

linux linux kernel 2.6.7

linux linux kernel 2.6.9

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.2

linux linux kernel 2.6.11.3

linux linux kernel 2.6.11

linux linux kernel 2.6.12

linux linux kernel 2.6.13.4

linux linux kernel 2.6.13

linux linux kernel 2.6.14.1

linux linux kernel 2.6.14.2

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.5

linux linux kernel 2.6.15

linux linux kernel 2.6.16.5

linux linux kernel 2.6.8

linux linux kernel 2.6.10

linux linux kernel 2.6.11.1

linux linux kernel 2.6.12.1

linux linux kernel 2.6.13.5

linux linux kernel 2.6.13.3

linux linux kernel 2.6.14.3

linux linux kernel 2.6.14.4

linux linux kernel 2.6.14

linux linux kernel 2.6.15.7

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16

linux linux kernel 2.6.16.47

linux linux kernel 2.6.16.46

linux linux kernel 2.6.16.55

linux linux kernel 2.6.16.54

linux linux kernel 2.6.16.30

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.32

linux linux kernel 2.6.16.39

linux linux kernel 2.6.16.40

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.15

linux linux kernel 2.6.16.23

linux linux kernel 2.6.17

linux linux kernel 2.6.17.4

linux linux kernel 2.6.17.5

linux linux kernel 2.6.17.10

linux linux kernel 2.6.17.11

linux linux kernel 2.6.18

linux linux kernel 2.6.18.4

linux linux kernel 2.6.18.5

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.61

linux linux kernel 2.6.16.62

linux linux kernel 2.6.16.52

linux linux kernel 2.6.16.45

linux linux kernel 2.6.16.60

linux linux kernel 2.6.16.53

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.41

linux linux kernel 2.6.16.42

linux linux kernel 2.6.16.18

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.26

linux linux kernel 2.6.16.25

linux linux kernel 2.6.17.2

linux linux kernel 2.6.17.3

linux linux kernel 2.6.17.8

linux linux kernel 2.6.17.9

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.6

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.4

linux linux kernel 2.6.12.6

linux linux kernel 2.6.14.6

linux linux kernel 2.6.15.4

linux linux kernel 2.6.15.1

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16.9

linux linux kernel 2.6.16.49

linux linux kernel 2.6.16.48

linux linux kernel 2.6.16.57

linux linux kernel 2.6.16.56

linux linux kernel 2.6.16.36

linux linux kernel 2.6.16.29

linux linux kernel 2.6.16.37

linux linux kernel 2.6.16.38

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.13

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.24

linux linux kernel 2.6.17.14

linux linux kernel 2.6.17.12

linux linux kernel 2.6.17.13

linux linux kernel 2.6.18.2

linux linux kernel 2.6.18.3

linux linux kernel 2.6.8.1

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.9

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11.5

linux linux kernel 2.6.12.3

linux linux kernel 2.6.12.2

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.1

linux linux kernel 2.6.14.7

linux linux kernel 2.6.14.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.10

linux linux kernel 2.6.16.51

linux linux kernel 2.6.16.50

linux linux kernel 2.6.16.59

linux linux kernel 2.6.16.58

linux linux kernel 2.6.16.34

linux linux kernel 2.6.16.35

linux linux kernel 2.6.16.43

linux linux kernel 2.6.16.44

linux linux kernel 2.6.16.20

linux linux kernel 2.6.16.19

linux linux kernel 2.6.16.28

linux linux kernel 2.6.16.27

linux linux kernel 2.6.17.1

linux linux kernel 2.6.17.6

linux linux kernel 2.6.17.7

linux linux kernel 2.6.18.1

linux linux kernel 2.6.19

linux linux kernel 2.6.19.7

linux linux kernel 2.6.19.4

linux linux kernel 2.6.19.1

linux linux kernel 2.6.19.3

linux linux kernel 2.6.19.5

linux linux kernel 2.6.19.6

linux linux kernel 2.6.19.2

Vendor Advisories

Mark Dowd discovered that the netfilter iptables module did not correcly handle fragmented IPv6 packets By sending specially crafted packets, a remote attacker could exploit this to bypass firewall rules This has has already been fixed for Ubuntu 610 in USN-395-1; this is the corresponding fix for Ubuntu 606(CVE-2006-4572) ...
CVE-2006-6060 CVE-2006-6106 CVE-2006-6535 CVE-2007-0958 CVE-2007-1357 CVE-2007-1592 Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code This update also fixes a regression in the smbfs subsystem which was introduced in DSA-1233 w ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2731 infamous41md reported multiple integer overflows in the Sbus PROM driver that would allo ...

References

CWE-119https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218602http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.5http://secunia.com/advisories/23408http://secunia.com/advisories/23427http://www.mandriva.com/security/advisories?name=MDKSA-2007:002http://secunia.com/advisories/23593http://www.trustix.org/errata/2007/0002/http://secunia.com/advisories/23609http://www.securityfocus.com/bid/21604https://issues.rpath.com/browse/RPL-848http://support.avaya.com/elmodocs2/security/ASA-2007-063.htmhttp://rhn.redhat.com/errata/RHSA-2007-0014.htmlhttp://www.novell.com/linux/security/advisories/2007_18_kernel.htmlhttp://www.novell.com/linux/security/advisories/2007_21_kernel.htmlhttp://www.ubuntu.com/usn/usn-416-1http://secunia.com/advisories/23752http://secunia.com/advisories/23997http://secunia.com/advisories/24098http://secunia.com/advisories/24105http://secunia.com/advisories/24206http://secunia.com/advisories/24547http://www.novell.com/linux/security/advisories/2007_30_kernel.htmlhttp://www.securityfocus.com/archive/1/471457http://www.debian.org/security/2007/dsa-1304http://www.mandriva.com/security/advisories?name=MDKSA-2007:012http://www.mandriva.com/security/advisories?name=MDKSA-2007:025http://www.novell.com/linux/security/advisories/2007_35_kernel.htmlhttp://www.novell.com/linux/security/advisories/2007_53_kernel.htmlhttp://secunia.com/advisories/25683http://secunia.com/advisories/25714http://secunia.com/advisories/25691http://secunia.com/advisories/25226http://secunia.com/advisories/27227http://www.debian.org/security/2008/dsa-1503http://secunia.com/advisories/29058http://www.vupen.com/english/advisories/2006/5037http://marc.info/?l=linux-kernel&m=116614741607528&w=2http://marc.info/?l=linux-kernel&m=116648929829440&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/30912https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10891http://www.securityfocus.com/archive/1/459615/100/0/threadedhttps://usn.ubuntu.com/416-1/https://nvd.nist.gov