Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2006-2071

Disclosure Date: April 27, 2006
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • linux

Products

  • linux kernel 2.4.0,
  • linux kernel 2.4.1,
  • linux kernel 2.4.10,
  • linux kernel 2.4.11,
  • linux kernel 2.4.12,
  • linux kernel 2.4.13,
  • linux kernel 2.4.14,
  • linux kernel 2.4.15,
  • linux kernel 2.4.16,
  • linux kernel 2.4.17,
  • linux kernel 2.4.18,
  • linux kernel 2.4.19,
  • linux kernel 2.4.2,
  • linux kernel 2.4.20,
  • linux kernel 2.4.21,
  • linux kernel 2.4.22,
  • linux kernel 2.4.23,
  • linux kernel 2.4.23 ow2,
  • linux kernel 2.4.24,
  • linux kernel 2.4.24 ow1,
  • linux kernel 2.4.25,
  • linux kernel 2.4.26,
  • linux kernel 2.4.27,
  • linux kernel 2.4.28,
  • linux kernel 2.4.29,
  • linux kernel 2.4.3,
  • linux kernel 2.4.30,
  • linux kernel 2.4.31,
  • linux kernel 2.4.32,
  • linux kernel 2.4.33,
  • linux kernel 2.4.4,
  • linux kernel 2.4.5,
  • linux kernel 2.4.6,
  • linux kernel 2.4.7,
  • linux kernel 2.4.8,
  • linux kernel 2.4.9,
  • linux kernel 2.6 test9 cvs,
  • linux kernel 2.6.0,
  • linux kernel 2.6.1,
  • linux kernel 2.6.10,
  • linux kernel 2.6.11,
  • linux kernel 2.6.11.11,
  • linux kernel 2.6.11.12,
  • linux kernel 2.6.11.5,
  • linux kernel 2.6.11.6,
  • linux kernel 2.6.11.7,
  • linux kernel 2.6.11.8,
  • linux kernel 2.6.12,
  • linux kernel 2.6.12.1,
  • linux kernel 2.6.12.2,
  • linux kernel 2.6.12.3,
  • linux kernel 2.6.12.4,
  • linux kernel 2.6.12.5,
  • linux kernel 2.6.12.6,
  • linux kernel 2.6.13,
  • linux kernel 2.6.13.1,
  • linux kernel 2.6.13.2,
  • linux kernel 2.6.13.3,
  • linux kernel 2.6.13.4,
  • linux kernel 2.6.14,
  • linux kernel 2.6.14.1,
  • linux kernel 2.6.14.2,
  • linux kernel 2.6.14.3,
  • linux kernel 2.6.14.4,
  • linux kernel 2.6.14.5,
  • linux kernel 2.6.15,
  • linux kernel 2.6.15.1,
  • linux kernel 2.6.15.2,
  • linux kernel 2.6.15.3,
  • linux kernel 2.6.15.4,
  • linux kernel 2.6.15.5,
  • linux kernel 2.6.16,
  • linux kernel 2.6.2,
  • linux kernel 2.6.3,
  • linux kernel 2.6.4,
  • linux kernel 2.6.5,
  • linux kernel 2.6.6,
  • linux kernel 2.6.7,
  • linux kernel 2.6.8,
  • linux kernel 2.6.9

References

Advisory

Additional Info

Technical Analysis