mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
168 lines
6.2 KiB
JSON
168 lines
6.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2006-7051",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2007-02-24T00:28:00.000",
|
||
|
"lastModified": "2018-10-30T16:25:10.013",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "The sys_timer_create function in posix-timers.c for Linux kernel 2.6.x allows local users to cause a denial of service (memory consumption) and possibly bypass memory limits or cause other processes to be killed by creating a large number of posix timers, which are allocated in kernel memory but are not treated as part of the process' memory."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "La funci\u00f3n sys_timer_create en posix-timers.c para Linux kernel 2.6.x permite a usuarios locales provocar denegaci\u00f3n de servicio (consumo de memoria) y posiblemente evitar l\u00edmites de memoria o provocar otros procesos sean eliminaod con la creaci\u00f3n de un gran n\u00famero de contadores de tiempo posix, lo cual son destinados en la memoria kernel pero no se consideran como parte del proceso de memoria."
|
||
|
}
|
||
|
],
|
||
|
"vendorComments": [
|
||
|
{
|
||
|
"organization": "Red Hat",
|
||
|
"comment": "This issue can only be exploited if pending signals (ulimit -i) is set to "unlimited". In case of Red Hat Enterprise Linux version 2.1, 3 and 4 this is not the case and therefore they are not vulnerable to this issue.\n",
|
||
|
"lastModified": "2007-03-14T00:00:00"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 4.9
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7A252C50-D63A-4FC0-A51E-A63A939D6AA1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://securityreason.com/securityalert/2287",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/430278/30/5790/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25712",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.exploit-db.com/exploits/1657",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|