Vulnerability Name:

CVE-2006-1814 (CCN-25764)

Assigned:2006-04-12
Published:2006-04-12
Updated:2017-07-20
Summary:NetBSD 1.6, 2.0, 2.1 and 3.0 allows local users to cause a denial of service (memory exhaustion) by using the sysctl system call to lock a large buffer into physical memory.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: NETBSD
Type: UNKNOWN
NetBSD-SA2006-013

Source: CCN
Type: NetBSD Security Advisory 2006-013
sysctl(3) local denial of service

Source: MITRE
Type: CNA
CVE-2006-1814

Source: CCN
Type: SA19616
NetBSD "sysctl()" Local Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
19616

Source: CCN
Type: SECTRACK ID: 1015909
NetBSD sysctl() Buffer Validation Error Lets Local Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1015909

Source: OSVDB
Type: UNKNOWN
24579

Source: CCN
Type: OSVDB ID: 24579
NetBSD sysctl() Memory Exhaustion Local DoS

Source: BID
Type: UNKNOWN
17498

Source: CCN
Type: BID-17498
NetBSD Sysctl Local Denial of Service Vulnerability

Source: XF
Type: UNKNOWN
bsd-sysctl-dos(25764)

Source: XF
Type: UNKNOWN
bsd-sysctl-dos(25764)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:3.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netbsd netbsd 1.6
    netbsd netbsd 1.6 beta
    netbsd netbsd 1.6.1
    netbsd netbsd 1.6.2
    netbsd netbsd 2.0
    netbsd netbsd 2.0.1
    netbsd netbsd 2.0.2
    netbsd netbsd 2.0.3
    netbsd netbsd 2.1
    netbsd netbsd 3.0
    netbsd netbsd 1.6 beta
    netbsd netbsd 1.6
    netbsd netbsd 1.6.1
    netbsd netbsd 1.6.2
    netbsd netbsd 2.0
    netbsd netbsd 2.1
    netbsd netbsd 2.0.3
    netbsd netbsd 3.0
    netbsd netbsd 2.0.1
    netbsd netbsd 2.0.2