First published: Mon Jan 09 2006(Updated: )
The kernfs_xread function in kernfs in NetBSD 1.6 through 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges via the lseek system call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =1.6 | |
NetBSD NetBSD | =2.1 | |
NetBSD NetBSD | =2.0.2 | |
NetBSD NetBSD | =1.6.1 | |
NetBSD NetBSD | =2.0.3 | |
NetBSD NetBSD | =1.6.2 | |
NetBSD NetBSD | =1.6-beta | |
NetBSD NetBSD | =2.0.1 | |
NetBSD NetBSD | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0145 is considered to have a high severity due to its potential to allow local users to read arbitrary kernel memory and gain elevated privileges.
To fix CVE-2006-0145, update your NetBSD or OpenBSD system to the latest version that addresses this vulnerability.
CVE-2006-0145 affects NetBSD versions 1.6 through 2.1 and OpenBSD version 3.8.
If exploited, CVE-2006-0145 can lead to unauthorized access to sensitive information in kernel memory and privilege escalation.
No, CVE-2006-0145 is a local exploitation vulnerability that requires local user access to be exploited.