{ "id": "CVE-2006-4655", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-09T00:04:00.000", "lastModified": "2025-04-03T01:03:51.193", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Strcmp function in the XKEYBOARD extension in X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment variable value." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en funci\u00f3n Strcmp en la extensi\u00f3n XKEYBOARD en Window System X11R6.4 y anteriores, seg\u00fan lo utilizado en SCO UnixWare 7.1.3 y Sun Solaris 8 hasta la 10, permite a un usuario local subir privilegios a trav\u00e9s del valor de la larga variable de entorno _XKB_CHARSET." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "67E12F60-B4AF-4EF1-A4AA-5E9F0B8B0690" }, { "vulnerable": true, "criteria": "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*", "matchCriteriaId": "32CF7469-6D2F-4E34-8013-7F0D3433D0B2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "matchCriteriaId": "7BF232A9-9E0A-481E-918D-65FC82EF36D8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*", "matchCriteriaId": "0C0C3793-E011-4915-8F86-CE622A2D37D1" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/21815", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/21845", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/21856", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/21993", "source": "cve@mitre.org" }, { "url": "http://securityreason.com/securityalert/1545", "source": "cve@mitre.org" }, { "url": "http://securitytracker.com/id?1016806", "source": "cve@mitre.org" }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102570-1", "source": "cve@mitre.org" }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-195.htm", "source": "cve@mitre.org" }, { "url": "http://www.risesecurity.org/advisory/RISE-2006001.txt", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/445579/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/19905", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/3525", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/3529", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28820", "source": "cve@mitre.org" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1798", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/21815", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/21845", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/21856", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/21993", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securityreason.com/securityalert/1545", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securitytracker.com/id?1016806", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102570-1", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-195.htm", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.risesecurity.org/advisory/RISE-2006001.txt", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/445579/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/19905", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/3525", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/3529", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28820", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1798", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }