ID CVE-2006-7051
Summary The sys_timer_create function in posix-timers.c for Linux kernel 2.6.x allows local users to cause a denial of service (memory consumption) and possibly bypass memory limits or cause other processes to be killed by creating a large number of posix timers, which are allocated in kernel memory but are not treated as part of the process' memory.
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 30-10-2018 - 16:25)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bugtraq 20060404 Linux Kernel Local DoS vulnerability.
exploit-db 1657
sreason 2287
xf linux-systimercreate-dos(25712)
statements via4
contributor Mark J Cox
lastmodified 2007-03-14
organization Red Hat
statement This issue can only be exploited if pending signals (ulimit -i) is set to "unlimited". In case of Red Hat Enterprise Linux version 2.1, 3 and 4 this is not the case and therefore they are not vulnerable to this issue.
Last major update 30-10-2018 - 16:25
Published 24-02-2007 - 00:28
Back to Top