mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
179 lines
6.2 KiB
JSON
179 lines
6.2 KiB
JSON
{
|
|
"id": "CVE-2006-6385",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-12-08T01:28:00.000",
|
|
"lastModified": "2018-10-17T21:48:00.017",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with \"kernel-level\" privileges via an incorrect function call in certain OID handlers."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de buffer basado en pila en controladores de adaptador de red Intel PRO 10/100, PRO/1000 y PRO/10GbE PCI, PCI-X y PCIe (tambi\u00e9n conocido como controladores miniport NDIS) en versiones anteriores a 20061205 permite a usuarios locales ejecutar c\u00f3digo arbitrario con privilegios \"kernel-level\" a trav\u00e9s de una llamada a una funci\u00f3n incorrecta en ciertos manejadores OID."
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "Red Hat",
|
|
"comment": "Not Vulnerable.\neEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows.",
|
|
"lastModified": "2006-12-08T00:00:00"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.5.14",
|
|
"matchCriteriaId": "FBA8273D-2CEB-49CB-9E1A-674D9EE47C62"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.0.3",
|
|
"matchCriteriaId": "D5B30BDD-F48F-4045-BD35-2AA6285A51DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.0.27.0",
|
|
"matchCriteriaId": "6525A086-3048-4FAB-BB7A-0DC5DFE7F4F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "7.2.7",
|
|
"matchCriteriaId": "BBD46EB1-FFCE-4A82-8317-0ADB45046ECD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.7.1.0",
|
|
"matchCriteriaId": "BB4B7746-9EA9-4F5C-B2FF-9175C2621683"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "9.0.15",
|
|
"matchCriteriaId": "5518B5CD-9438-4C71-B312-C48621910123"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_1000_pcie_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "9.1.30.0",
|
|
"matchCriteriaId": "81471081-ECED-4425-9E0E-7CCCF613CE7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:intel:pro_10gbe_adapters:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.0.109",
|
|
"matchCriteriaId": "AB2D2ABA-5F2C-4BC9-8484-06E330E833C1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://research.eeye.com/html/advisories/published/AD20061207.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://research.eeye.com/html/advisories/upcoming/20060710.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/2007",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1017346",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.intel.com/support/network/sb/CS-023726.htm",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/296681",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/453852/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/21456",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/4871",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30750",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |