Vulnerabilities > CVE-2006-6385 - Local Privilege Escalation vulnerability in Intel Network Drivers
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 4 |
Statements
contributor | Joshua Bressers |
lastmodified | 2006-12-08 |
organization | Red Hat |
statement | Not Vulnerable. eEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows. |
References
- http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
- http://research.eeye.com/html/advisories/published/AD20061207.html
- http://research.eeye.com/html/advisories/upcoming/20060710.html
- http://secunia.com/advisories/23221
- http://securityreason.com/securityalert/2007
- http://securitytracker.com/id?1017346
- http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
- http://www.intel.com/support/network/sb/CS-023726.htm
- http://www.kb.cert.org/vuls/id/296681
- http://www.securityfocus.com/archive/1/453852/100/0/threaded
- http://www.securityfocus.com/bid/21456
- http://www.vupen.com/english/advisories/2006/4871
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30750