Vulnerability Name:

CVE-2006-6304 (CCN-30926)

Assigned:2006-12-14
Published:2006-12-14
Updated:2017-10-11
Summary:The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
1.9 Low (REDHAT CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N)
1.4 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-399
Vulnerability Consequences:File Manipulation
References:Source: MITRE
Type: CNA
CVE-2006-6304

Source: CCN
Type: VMSA-2010-0009
ESXi utilities and ESX Service Console third party updates

Source: CCN
Type: RHSA-2010-0046
Important: kernel security and bug fix update

Source: CCN
Type: SA23349
Linux Kernel "do_coredump()" File Overwrite Vulnerability

Source: SECUNIA
Type: Vendor Advisory
23349

Source: CCN
Type: SA39920
VMware vMA kernel Multiple Vulnerabilities

Source: CCN
Type: SA39972
VMware ESXi ntp Mode 7 Request Denial of Service

Source: CCN
Type: SA39973
VMware ESX Multiple krb5 Vulnerabilities

Source: CCN
Type: SA39974
VMware ESX GCC libtool Search Path Privilege Escalation Security Issue

Source: CCN
Type: SA39975
VMware ESX gzip unlzw() Integer Underflow Vulnerability

Source: CCN
Type: SA39976
VMware vMA OpenSSL CRYPTO_free_all_ex_data() Memory Leak Vulnerability

Source: CCN
Type: SA39977
VMware vMA Multiple krb5 Vulnerabilities

Source: CCN
Type: SA39979
VMware vMA GCC libtool Search Path Privilege Escalation Security Issue

Source: CCN
Type: SA39980
VMware vMA gzip unlzw() Integer Underflow Vulnerability

Source: CCN
Type: SA39981
VMware vMA sudo Privilege Escalation Security Issues

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/css/P8/documents/100073666

Source: CCN
Type: The The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: CCN
Type: The Linux Kernel Archives
ChangeLog-2.6.19.1

Source: CONFIRM
Type: UNKNOWN
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.1

Source: BID
Type: Patch
21591

Source: CCN
Type: BID-21591
Linux Kernel Do_Coredump Security Bypass Vulnerability

Source: TRUSTIX
Type: UNKNOWN
2006-0074

Source: VUPEN
Type: Vendor Advisory
ADV-2006-5002

Source: XF
Type: UNKNOWN
linux-exec-file-manipulation(30926)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10797

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:7446

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0046

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0095

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:22940
    P
    ELSA-2010:0046: kernel security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21777
    P
    RHSA-2010:0046: kernel security and bug fix update (Important)
    2014-02-24
    oval:org.mitre.oval:def:7446
    V
    Linux Kernel Do_Coredump Security Bypass Vulnerability
    2014-01-20
    oval:org.mitre.oval:def:10797
    V
    The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.
    2013-04-29
    oval:com.redhat.rhsa:def:20100046
    P
    RHSA-2010:0046: kernel security and bug fix update (Important)
    2010-01-19
    BACK
    linux linux kernel 2.6.19
    linux linux kernel 2.6.14.4
    linux linux kernel 2.6.6 rc1
    linux linux kernel 2.6.14.3
    linux linux kernel 2.6.15.1
    linux linux kernel 2.6.16.1
    linux linux kernel 2.6.16
    linux linux kernel 2.6.16.11
    linux linux kernel 2.6.19
    linux linux kernel 2.6.15
    linux linux kernel 2.6.14
    linux linux kernel 2.6.17
    linux linux kernel 2.6.18
    linux linux kernel 2.6.2
    linux linux kernel 2.6.0 test9
    linux linux kernel 2.6.0 test8
    linux linux kernel 2.6.0 test7
    linux linux kernel 2.6.0 test6
    linux linux kernel 2.6.0 test5
    linux linux kernel 2.6.0 test4
    linux linux kernel 2.6.0 test3
    linux linux kernel 2.6.0 test2
    linux linux kernel 2.6.0 test11
    linux linux kernel 2.6.0 test10
    linux linux kernel 2.6.0 test1
    linux linux kernel 2.6.8 rc3
    linux linux kernel 2.6.8 rc2
    linux linux kernel 2.6.8 rc1
    linux linux kernel 2.6.7 rc1
    linux linux kernel 2.6.1 rc2
    linux linux kernel 2.6.1 rc1
    linux linux kernel 2.6.17 rc5
    linux linux kernel 2.6.17.8
    linux linux kernel 2.6.17.7
    linux linux kernel 2.6.17.6
    linux linux kernel 2.6.17.5
    linux linux kernel 2.6.17.3
    linux linux kernel 2.6.17.11
    linux linux kernel 2.6.17.10
    linux linux kernel 2.6.17.1
    linux linux kernel 2.6.16 rc1
    linux linux kernel 2.6.16.9
    linux linux kernel 2.6.16.7
    linux linux kernel 2.6.16.27
    linux linux kernel 2.6.16.23
    linux linux kernel 2.6.16.19
    linux linux kernel 2.6.16.13
    linux linux kernel 2.6.16.12
    linux linux kernel 2.6.15 rc3
    linux linux kernel 2.6.14 rc2
    linux linux kernel 2.6.15 rc1
    linux linux kernel 2.6.15.5
    linux linux kernel 2.6.15.4
    linux linux kernel 2.6.15.3
    linux linux kernel 2.6.15.2
    linux linux kernel 2.6.15 rc2
    linux linux kernel 2.6.14 rc4
    linux linux kernel 2.6.14 rc3
    linux linux kernel 2.6.14 rc1
    linux linux kernel 2.6.14.5
    linux linux kernel 2.6.14.2
    linux linux kernel 2.6.14.1
    linux linux kernel 2.6.13 rc7
    linux linux kernel 2.6.13 rc6
    linux linux kernel 2.6.13 rc4
    linux linux kernel 2.6.13 rc1
    linux linux kernel 2.6.12 rc5
    linux linux kernel 2.6.12 rc4
    linux linux kernel 2.6.12 rc1
    linux linux kernel 2.6.11 rc4
    linux linux kernel 2.6.11 rc3
    linux linux kernel 2.6.11 rc2
    linux linux kernel 2.6.10 rc2
    linux linux kernel 2.6.12.12
    linux linux kernel 2.6.12.22
    linux linux kernel 2.6.17.12
    linux linux kernel 2.6.17.13
    linux linux kernel 2.6.17.14
    linux linux kernel 2.6.18.1
    linux linux kernel 2.6.18.3
    linux linux kernel 2.6.18.4
    linux linux kernel 2.6.19 rc1
    linux linux kernel 2.6.19 rc2
    linux linux kernel 2.6.19 rc3
    linux linux kernel 2.6.19 rc4
    linux linux kernel 2.6.15.11
    linux linux kernel 2.6.0
    linux linux kernel 2.6.1
    linux linux kernel 2.6.10
    linux linux kernel 2.6.11
    linux linux kernel 2.6.11.11
    linux linux kernel 2.6.11.12
    linux linux kernel 2.6.11.4
    linux linux kernel 2.6.11.5
    linux linux kernel 2.6.11.6
    linux linux kernel 2.6.11.7
    linux linux kernel 2.6.11.8
    linux linux kernel 2.6.12
    linux linux kernel 2.6.12.1
    linux linux kernel 2.6.12.2
    linux linux kernel 2.6.12.3
    linux linux kernel 2.6.12.4
    linux linux kernel 2.6.12.5
    linux linux kernel 2.6.12.6
    linux linux kernel 2.6.13
    linux linux kernel 2.6.13.1
    linux linux kernel 2.6.13.2
    linux linux kernel 2.6.13.3
    linux linux kernel 2.6.13.4
    linux linux kernel 2.6.3
    linux linux kernel 2.6.4
    linux linux kernel 2.6.5
    linux linux kernel 2.6.6
    linux linux kernel 2.6.7
    linux linux kernel 2.6.8
    linux linux kernel 2.6.9
    redhat enterprise linux 5
    redhat enterprise linux 5
    vmware esx server 4.0