Vulnerabilities > CVE-2006-6495 - Unspecified vulnerability in SUN Solaris and Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via large precision padding values in a format string specifier in the format parameter of the doprf function. NOTE: this issue normally does not cross privilege boundaries, except in cases of external introduction of malicious message files, or if it is leveraged with other vulnerabilities such as CVE-2006-6494.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Oval
accepted | 2007-09-27T08:57:42.313-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Stack-based buffer overflow in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via large precision padding values in a format string specifier in the format parameter of the doprf function. NOTE: this issue normally does not cross privilege boundaries, except in cases of external introduction of malicious message files, or if it is leveraged with other vulnerabilities such as CVE-2006-6494. | ||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:1909 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2007-08-10T12:25:21.000-04:00 | ||||||||||||||||||||||||
title | Security Vulnerabilities in Solaris ld.so.1(1) may Lead to Execution of Arbitrary Code with Elevated Privileges | ||||||||||||||||||||||||
version | 35 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=450
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=450
- http://secunia.com/advisories/23317
- http://secunia.com/advisories/23317
- http://secunia.com/advisories/23991
- http://secunia.com/advisories/23991
- http://securitytracker.com/id?1017376
- http://securitytracker.com/id?1017376
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102724-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102724-1
- http://support.avaya.com/elmodocs2/security/ASA-2007-019.htm
- http://support.avaya.com/elmodocs2/security/ASA-2007-019.htm
- http://www.securityfocus.com/bid/21564
- http://www.securityfocus.com/bid/21564
- http://www.vupen.com/english/advisories/2006/4979
- http://www.vupen.com/english/advisories/2006/4979
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30848
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30848
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1909
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1909