exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mcafee-linux1.txt

mcafee-linux1.txt
Posted Aug 27, 2006
Authored by Wei Wang | Site mcafee.com

The Linux kernel is susceptible to a locally exploitable flaw which may allow local users to gain root privileges and execute arbitrary code at kernel privilege level. Versions affected include 2.4.23 through 2.4.32, 2.6 up to and including 2.6.17.7.

tags | advisory, arbitrary, kernel, local, root
systems | linux
SHA-256 | 7275b8171711354a13630e315ec244484467c3a1094dca1f19ecb620b5458b4f

mcafee-linux1.txt

Change Mirror Download
________________________________________________________________________
_______

McAfee, Inc.
McAfee(r) Avert(r) Labs Security Advisory
Public Release Date: 2006-08-22

Linux Kernel SCTP Privilege Elevation Vulnerability

CVE-2006-3745
________________________________________________________________________
_______

* Synopsis

The Linux kernel is susceptible to a locally exploitable flaw which may
allow local users to gain root privileges and execute arbitrary code at
kernel privilege level.
________________________________________________________________________
_______

* Vulnerable System or Application

Linux Kernel Versions: 2.4.23--2.4.32, 2.6 up to and including 2.6.17.7

________________________________________________________________________
_______

* Vulnerability Information

A locally exploitable flaw has been found in the Linux sctp module
sctp_make_abort_user function that allows local users to gain root
privileges and also execute arbitrary code at kernel privilege level.

________________________________________________________________________
_______

* Resolution

The Linux Kernel Archives has released a fix for this vulnerability.
Complete instructions for automatically updating kernel modules can be
downloaded at the following site:
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git;
a=commit;h=96ec9da385cf72c5f775e5f163420ea92e66ded2

________________________________________________________________________
_______

* Credits

This vulnerability was discovered by Wei Wang of McAfee Avert Labs.

________________________________________________________________________
_______

* Legal Notice

Copyright (C) 2006 McAfee, Inc.
The information contained within this advisory is provided for the
convenience of McAfee's customers, and may be redistributed provided
that no fee is charged for distribution and that the advisory is not
modified in any way. McAfee makes no representations or warranties
regarding the accuracy of the information referenced in this document,
or the suitability of that information for your purposes.

McAfee, Inc. and McAfee Avert Labs are registered Trademarks of McAfee,
Inc. and/or its affiliated companies in the United States and/or other
Countries. All other registered and unregistered trademarks in this
document are the sole property of their respective owners.


Best regards,

Dave Marcus, B.A., CCNA, MCSE
Security Research and Communications Manager
McAfee(r) Avert(r) Labs
(443) 321-3771 Office
(443) 668-0048 Mobile
McAfee Threat Center
<http://www.mcafee.com/us/threat_center/default.asp>
McAfee Avert Labs Research Blog <http://www.avertlabs.com/research/blog>



Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close