CVE-2006-4997
🟡 Monitoruj
Błąd w funkcji clip_mkip w jądrze Linux umożliwia zdalnym atakującym wywołanie awarii systemu.
CVSS
7.5
EPSS
35.0%
Exploit
poc
Vendor
canonical
Opis źródłowy (NVD)
The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).
dos exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 35.0% |
| Opublikowano (NVD) | 2006-10-10 04:06:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 (cve@mitre.org) [Exploit, Issue Tracking]
- http://secunia.com/advisories/22253 (cve@mitre.org) [Broken Link, Vendor Advisory]
- http://secunia.com/advisories/22279 (cve@mitre.org) [Broken Link, Patch, Vendor Advisory]
- http://secunia.com/advisories/22292 (cve@mitre.org) [Broken Link, Patch, Vendor Advisory]
- http://secunia.com/advisories/22497 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/22762 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/22945 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23064 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23370 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23384 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23395 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23474 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23752 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/23788 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/24288 (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/25691 (cve@mitre.org) [Broken Link]
- http://securitytracker.com/id?1017526 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm (cve@mitre.org) [Third Party Advisory]
- http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm (cve@mitre.org) [Third Party Advisory]
- http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm (cve@mitre.org) [Third Party Advisory]
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2 (cve@mitre.org) [Broken Link]
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 (cve@mitre.org) [Broken Link]
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 (cve@mitre.org) [Broken Link]
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 (cve@mitre.org) [Broken Link]
- http://www.novell.com/linux/security/advisories/2006_79_kernel.html (cve@mitre.org) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2006-0689.html (cve@mitre.org) [Broken Link, Patch]
- http://www.redhat.com/support/errata/RHSA-2006-0710.html (cve@mitre.org) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2007-0012.html (cve@mitre.org) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2007-0013.html (cve@mitre.org) [Broken Link]
- http://www.securityfocus.com/archive/1/471457 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/20363 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.ubuntu.com/usn/usn-395-1 (cve@mitre.org) [Third Party Advisory]
- http://www.us.debian.org/security/2006/dsa-1233 (cve@mitre.org) [Broken Link]
- http://www.us.debian.org/security/2006/dsa-1237 (cve@mitre.org) [Broken Link]
- http://www.vupen.com/english/advisories/2006/3937 (cve@mitre.org) [Broken Link]
- http://www.vupen.com/english/advisories/2006/3999 (cve@mitre.org) [Broken Link]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29387 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388 (cve@mitre.org) [Broken Link]