First published: Tue Jan 31 2006(Updated: )
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =1.0 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.3 | |
SUSE Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0043 is classified as a high severity vulnerability due to its potential to allow local users to execute arbitrary code.
To mitigate CVE-2006-0043, it is recommended to update the affected SUSE Linux versions to the latest patched release.
CVE-2006-0043 affects SUSE Linux versions 9.1 through 10.0.
The vulnerability in CVE-2006-0043 is due to a buffer overflow in the realpath function in nfs-server rpc.mountd.
CVE-2006-0043 can be exploited by local users via unspecified vectors involving mount requests and symlinks.