fkie_cve-2006-6385
Vulnerability from fkie_nvd
Published
2006-12-08 01:28
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.
References
cve@mitre.orghttp://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
cve@mitre.orghttp://research.eeye.com/html/advisories/published/AD20061207.html
cve@mitre.orghttp://research.eeye.com/html/advisories/upcoming/20060710.html
cve@mitre.orghttp://secunia.com/advisories/23221Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/2007
cve@mitre.orghttp://securitytracker.com/id?1017346
cve@mitre.orghttp://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
cve@mitre.orghttp://www.intel.com/support/network/sb/CS-023726.htmPatch
cve@mitre.orghttp://www.kb.cert.org/vuls/id/296681US Government Resource
cve@mitre.orghttp://www.securityfocus.com/archive/1/453852/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/21456
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4871
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30750
af854a3a-2127-422b-91ae-364da2661108http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
af854a3a-2127-422b-91ae-364da2661108http://research.eeye.com/html/advisories/published/AD20061207.html
af854a3a-2127-422b-91ae-364da2661108http://research.eeye.com/html/advisories/upcoming/20060710.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23221Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2007
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017346
af854a3a-2127-422b-91ae-364da2661108http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/support/network/sb/CS-023726.htmPatch
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/296681US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/453852/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21456
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4871
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30750



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8273D-2CEB-49CB-9E1A-674D9EE47C62",
              "versionEndIncluding": "3.5.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5B30BDD-F48F-4045-BD35-2AA6285A51DB",
              "versionEndIncluding": "4.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6525A086-3048-4FAB-BB7A-0DC5DFE7F4F0",
              "versionEndIncluding": "8.0.27.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD46EB1-FFCE-4A82-8317-0ADB45046ECD",
              "versionEndIncluding": "7.2.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB4B7746-9EA9-4F5C-B2FF-9175C2621683",
              "versionEndIncluding": "8.7.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518B5CD-9438-4C71-B312-C48621910123",
              "versionEndIncluding": "9.0.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_1000_pcie_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81471081-ECED-4425-9E0E-7CCCF613CE7B",
              "versionEndIncluding": "9.1.30.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pro_10gbe_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2D2ABA-5F2C-4BC9-8484-06E330E833C1",
              "versionEndIncluding": "1.0.109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with \"kernel-level\" privileges via an incorrect function call in certain OID handlers."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer basado en pila en controladores de adaptador de red Intel PRO 10/100, PRO/1000 y PRO/10GbE PCI, PCI-X y PCIe (tambi\u00e9n conocido como controladores miniport NDIS) en versiones anteriores a 20061205 permite a usuarios locales ejecutar c\u00f3digo arbitrario con privilegios \"kernel-level\" a trav\u00e9s de una llamada a una funci\u00f3n incorrecta en ciertos manejadores OID."
    }
  ],
  "id": "CVE-2006-6385",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-08T01:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://research.eeye.com/html/advisories/published/AD20061207.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://research.eeye.com/html/advisories/upcoming/20060710.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23221"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017346"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.intel.com/support/network/sb/CS-023726.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/296681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/453852/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/21456"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4871"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://research.eeye.com/html/advisories/published/AD20061207.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://research.eeye.com/html/advisories/upcoming/20060710.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.intel.com/support/network/sb/CS-023726.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/296681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/453852/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30750"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not Vulnerable.\neEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege  Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows.",
      "lastModified": "2006-12-08T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…