CVE-2006-6385 (GCVE-0-2006-6385)
Vulnerability from cvelistv5
Published
2006-12-08 01:00
Modified
2024-08-07 20:26
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.
References
cve@mitre.org http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
cve@mitre.org http://research.eeye.com/html/advisories/published/AD20061207.html
cve@mitre.org http://research.eeye.com/html/advisories/upcoming/20060710.html
cve@mitre.org http://secunia.com/advisories/23221 Vendor Advisory
cve@mitre.org http://securityreason.com/securityalert/2007
cve@mitre.org http://securitytracker.com/id?1017346
cve@mitre.org http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
cve@mitre.org http://www.intel.com/support/network/sb/CS-023726.htm Patch
cve@mitre.org http://www.kb.cert.org/vuls/id/296681 US Government Resource
cve@mitre.org http://www.securityfocus.com/archive/1/453852/100/0/threaded
cve@mitre.org http://www.securityfocus.com/bid/21456
cve@mitre.org http://www.vupen.com/english/advisories/2006/4871
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/30750
af854a3a-2127-422b-91ae-364da2661108 http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
af854a3a-2127-422b-91ae-364da2661108 http://research.eeye.com/html/advisories/published/AD20061207.html
af854a3a-2127-422b-91ae-364da2661108 http://research.eeye.com/html/advisories/upcoming/20060710.html
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23221 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://securityreason.com/securityalert/2007
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1017346
af854a3a-2127-422b-91ae-364da2661108 http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
af854a3a-2127-422b-91ae-364da2661108 http://www.intel.com/support/network/sb/CS-023726.htm Patch
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/296681 US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/453852/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/21456
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2006/4871
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/30750
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:26:46.044Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "intel-lan-driver-bo(30750)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30750"
          },
          {
            "name": "21456",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21456"
          },
          {
            "name": "2007",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2007"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://research.eeye.com/html/advisories/upcoming/20060710.html"
          },
          {
            "name": "[freebsd-security] 20061206 Intel LAN Driver Buffer Overflow Local Privilege Escalation",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.intel.com/support/network/sb/CS-023726.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://research.eeye.com/html/advisories/published/AD20061207.html"
          },
          {
            "name": "ADV-2006-4871",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4871"
          },
          {
            "name": "VU#296681",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/296681"
          },
          {
            "name": "23221",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23221"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html"
          },
          {
            "name": "20061207 EEYE: Intel Network Adapter Driver Local Privilege Escalation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/453852/100/0/threaded"
          },
          {
            "name": "1017346",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017346"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with \"kernel-level\" privileges via an incorrect function call in certain OID handlers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "intel-lan-driver-bo(30750)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30750"
        },
        {
          "name": "21456",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21456"
        },
        {
          "name": "2007",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2007"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://research.eeye.com/html/advisories/upcoming/20060710.html"
        },
        {
          "name": "[freebsd-security] 20061206 Intel LAN Driver Buffer Overflow Local Privilege Escalation",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.intel.com/support/network/sb/CS-023726.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://research.eeye.com/html/advisories/published/AD20061207.html"
        },
        {
          "name": "ADV-2006-4871",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4871"
        },
        {
          "name": "VU#296681",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/296681"
        },
        {
          "name": "23221",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23221"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html"
        },
        {
          "name": "20061207 EEYE: Intel Network Adapter Driver Local Privilege Escalation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/453852/100/0/threaded"
        },
        {
          "name": "1017346",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017346"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6385",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with \"kernel-level\" privileges via an incorrect function call in certain OID handlers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "intel-lan-driver-bo(30750)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30750"
            },
            {
              "name": "21456",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21456"
            },
            {
              "name": "2007",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2007"
            },
            {
              "name": "http://research.eeye.com/html/advisories/upcoming/20060710.html",
              "refsource": "MISC",
              "url": "http://research.eeye.com/html/advisories/upcoming/20060710.html"
            },
            {
              "name": "[freebsd-security] 20061206 Intel LAN Driver Buffer Overflow Local Privilege Escalation",
              "refsource": "MLIST",
              "url": "http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html"
            },
            {
              "name": "http://www.intel.com/support/network/sb/CS-023726.htm",
              "refsource": "CONFIRM",
              "url": "http://www.intel.com/support/network/sb/CS-023726.htm"
            },
            {
              "name": "http://research.eeye.com/html/advisories/published/AD20061207.html",
              "refsource": "MISC",
              "url": "http://research.eeye.com/html/advisories/published/AD20061207.html"
            },
            {
              "name": "ADV-2006-4871",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4871"
            },
            {
              "name": "VU#296681",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/296681"
            },
            {
              "name": "23221",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23221"
            },
            {
              "name": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html",
              "refsource": "CONFIRM",
              "url": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html"
            },
            {
              "name": "20061207 EEYE: Intel Network Adapter Driver Local Privilege Escalation",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/453852/100/0/threaded"
            },
            {
              "name": "1017346",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017346"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6385",
    "datePublished": "2006-12-08T01:00:00",
    "dateReserved": "2006-12-07T00:00:00",
    "dateUpdated": "2024-08-07T20:26:46.044Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-6385\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-12-08T01:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with \\\"kernel-level\\\" privileges via an incorrect function call in certain OID handlers.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer basado en pila en controladores de adaptador de red Intel PRO 10/100, PRO/1000 y PRO/10GbE PCI, PCI-X y PCIe (tambi\u00e9n conocido como controladores miniport NDIS) en versiones anteriores a 20061205 permite a usuarios locales ejecutar c\u00f3digo arbitrario con privilegios \\\"kernel-level\\\" a trav\u00e9s de una llamada a una funci\u00f3n incorrecta en ciertos manejadores OID.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.14\",\"matchCriteriaId\":\"FBA8273D-2CEB-49CB-9E1A-674D9EE47C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0.3\",\"matchCriteriaId\":\"D5B30BDD-F48F-4045-BD35-2AA6285A51DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.27.0\",\"matchCriteriaId\":\"6525A086-3048-4FAB-BB7A-0DC5DFE7F4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.2.7\",\"matchCriteriaId\":\"BBD46EB1-FFCE-4A82-8317-0ADB45046ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.7.1.0\",\"matchCriteriaId\":\"BB4B7746-9EA9-4F5C-B2FF-9175C2621683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.0.15\",\"matchCriteriaId\":\"5518B5CD-9438-4C71-B312-C48621910123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_1000_pcie_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.1.30.0\",\"matchCriteriaId\":\"81471081-ECED-4425-9E0E-7CCCF613CE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pro_10gbe_adapters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.109\",\"matchCriteriaId\":\"AB2D2ABA-5F2C-4BC9-8484-06E330E833C1\"}]}]}],\"references\":[{\"url\":\"http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://research.eeye.com/html/advisories/published/AD20061207.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://research.eeye.com/html/advisories/upcoming/20060710.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/23221\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/2007\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1017346\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.intel.com/support/network/sb/CS-023726.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/296681\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/453852/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/21456\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4871\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/30750\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://research.eeye.com/html/advisories/published/AD20061207.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://research.eeye.com/html/advisories/upcoming/20060710.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/2007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017346\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.intel.com/support/network/sb/CS-023726.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/296681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/453852/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/21456\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/30750\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not Vulnerable.\\neEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege  Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows.\",\"lastModified\":\"2006-12-08T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…