National Cyber-Alert System
Vulnerability Summary for CVE-2006-5823
Original release date:11/09/2006
Last revised:09/05/2008
Source:
US-CERT/NIST
Overview
The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs.
Impact
CVSS Severity (version 2.0):
Impact Subscore:
6.9
Exploitability Subscore:
1.9
CVSS Version 2 Metrics:
Access Vector: Locally exploitable
Access Complexity: High
Authentication: Not required to exploit
Impact Type:Allows disruption of serviceUnknown
- Official Statement from Red Hat (03/14/2007)
-
The CVE-2006-5823 is about a corrupted cramfs (MOKB-07-11-2006) that can cause a memory corruption and so crash the machine.
For Red Hat Enterpise Linux 3 this issue is tracked via Bugzilla #216960 and for Red Hat Enterprise Linux 4 it is tracked via Bugzilla #216958.
Red Hat Enterprise Linux 2.1 is not vulnerable to this issue.
This issue has been rated as having low impact, because root privileges or physical access to the machine are needed to mount a corrupted filesystem and crash the machine.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: UBUNTU
Name: USN-416-1
External Source: SUSE
Name: SUSE-SA:2006:079
External Source: CONFIRM
Name: http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
External Source: SECUNIA
Name: 24482
External Source: SECUNIA
Name: 24259
External Source: SECUNIA
Name: 24206
External Source: SECUNIA
Name: 24098
External Source: SECUNIA
Name: 23997
External Source: SECUNIA
Name: 22767
External Source: REDHAT
Name: RHSA-2007:0014
External Source: MISC
Name: http://projects.info-pull.com/mokb/MOKB-07-11-2006.html
External Source: MANDRIVA
Name: MDKSA-2007:060
External Source: MANDRIVA
Name: MDKSA-2007:047
External Source: BUGTRAQ
Name: 20070615 rPSA-2007-0124-1 kernel xen
External Source: MANDRIVA
Name: MDKSA-2007:060
External Source: MANDRIVA
Name: MDKSA-2007:047
External Source: DEBIAN
Name: DSA-1504
External Source: DEBIAN
Name: DSA-1503
External Source: SECUNIA
Name: 29058
External Source: SECUNIA
Name: 25691
External Source: SECUNIA
Name: 25630
External Source: SECUNIA
Name: 23474
External Source: REDHAT
Name: RHSA-2007:0436