ID CVE-2006-0043
Summary Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
References
Vulnerable Configurations
  • cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
CVSS
Base: 4.6 (as of 20-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 16388
debian DSA-975
misc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020
secunia
  • 18614
  • 18638
  • 18889
suse SUSE-SA:2006:005
vupen ADV-2006-0348
xf nfs-rpcmountd-realpath-bo(24347)
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement This issue did not affect Red Hat Enterprise Linux 2.1, 3, or 4.
Last major update 20-07-2017 - 01:29
Published 31-01-2006 - 02:03
Last modified 20-07-2017 - 01:29
Back to Top