Linux Kernel up to 2.6.16.6 Shared Memory mprotect access control

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Linux Kernel up to 2.6.16.6. It has been rated as problematic. Affected is the function mprotect of the component Shared Memory. The manipulation leads to access control.
This vulnerability is uniquely identified as CVE-2006-1524. No exploit exists.
Upgrading the affected component is advised.
Details
A vulnerability was found in Linux Kernel up to 2.6.16.6 (Operating System). It has been rated as problematic. This issue affects the function mprotect of the component Shared Memory. The manipulation with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-264. Impacted is confidentiality, and integrity. The summary by CVE is:
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
The bug was discovered 04/18/2006. The weakness was disclosed 04/19/2006 by Hugh Dickins (Website). The advisory is shared at kernel.org. The identification of this vulnerability is CVE-2006-1524 since 03/30/2006. The attack needs to approached within the local network. No form of authentication is needed for a successful exploitation. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1068 for this issue.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 30 days. During that time the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 22639 (Debian DSA-1097-1 : kernel-source-2.4.27 - several vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Debian Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at kernel.org. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published 2 months after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (25870), Tenable (22639), SecurityFocus (BID 17587†), OSVDB (24714†) and Secunia (SA19664†). The entries VDB-2098, VDB-2099, VDB-29944 and VDB-29314 are pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.4
VulDB Temp Score: 4.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 22639
Nessus Name: Debian DSA-1097-1 : kernel-source-2.4.27 - several vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 56956
OpenVAS Name: Debian Security Advisory DSA 1097-1 (kernel-source-2.4.27)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: kernel.org
Timeline
03/20/2006 🔍03/30/2006 🔍
04/18/2006 🔍
04/18/2006 🔍
04/18/2006 🔍
04/19/2006 🔍
04/19/2006 🔍
04/19/2006 🔍
04/19/2006 🔍
04/25/2006 🔍
04/26/2006 🔍
06/14/2006 🔍
10/14/2006 🔍
06/17/2019 🔍
Sources
Vendor: kernel.orgAdvisory: kernel.org
Researcher: Hugh Dickins
Status: Not defined
Confirmation: 🔍
CVE: CVE-2006-1524 (🔍)
GCVE (CVE): GCVE-0-2006-1524
GCVE (VulDB): GCVE-100-2177
X-Force: 25870 - Linux kernel madvise_remove security bypass, Medium Risk
SecurityFocus: 17587 - Linux Kernel Shared Memory Security Restriction Bypass Vulnerabilities
Secunia: 19664 - Linux Kernel Shared Memory Restrictions Bypass, Less Critical
OSVDB: 24714 - Linux Kernel madvise_remove IPC Permission Bypass
Vulnerability Center: 11246 - Linux Kernel before 2.6.16.6 Local Write Access to Readonly Files (\, Low
Vupen: ADV-2006-1391
See also: 🔍
Entry
Created: 04/26/2006 13:55Updated: 06/17/2019 07:31
Changes: 04/26/2006 13:55 (96), 06/17/2019 07:31 (3)
Complete: 🔍
Cache ID: 216:876:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.