First published: Mon Apr 03 2006(Updated: )
The elf_load_file function in NetBSD 2.0 through 3.0 allows local users to cause a denial of service (kernel crash) via an ELF interpreter that does not have a PT_LOAD section in its header, which triggers a null dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =2.1 | |
NetBSD NetBSD | =2.0.2 | |
NetBSD NetBSD | =2.0.3 | |
NetBSD NetBSD | =2.0.1 | |
NetBSD NetBSD | =3.0 | |
NetBSD NetBSD | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1589 is classified as a denial of service vulnerability due to its potential to cause a kernel crash.
To fix CVE-2006-1589, users should upgrade their NetBSD systems to a version that has addressed this vulnerability.
CVE-2006-1589 affects NetBSD versions 2.0 through 3.0, specifically including 2.0, 2.0.1, 2.0.2, 2.0.3, 2.1, and 3.0.
The vulnerability in CVE-2006-1589 is caused by an ELF interpreter missing a PT_LOAD section in its header, leading to a null dereference.
CVE-2006-1589 can be exploited by local users with the ability to execute ELF binaries.