First published: Tue Apr 18 2006(Updated: )
The kernel in NetBSD-current before September 28, 2005 allows local users to cause a denial of service (system crash) by using the SIOCGIFALIAS ioctl to gather information on a non-existent alias of a network interface, which causes a NULL pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =1.6 | |
NetBSD NetBSD | =2.1 | |
NetBSD NetBSD | =2.0.2 | |
NetBSD NetBSD | =1.6.1 | |
NetBSD NetBSD | =2.0.3 | |
NetBSD NetBSD | =1.6.2 | |
NetBSD NetBSD | =1.6-beta | |
NetBSD NetBSD | =2.0.1 | |
NetBSD NetBSD | =3.0 | |
NetBSD NetBSD | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1797 is classified as a denial of service vulnerability due to a system crash from a NULL pointer dereference.
To fix CVE-2006-1797, it is recommended to upgrade to the latest version of NetBSD that patches this vulnerability.
CVE-2006-1797 affects local users of NetBSD versions 1.6, 1.6.1, 1.6.2, 2.0, 2.0.1, 2.0.2, 2.0.3, 2.1, and 3.0.
CVE-2006-1797 cannot be exploited remotely as it requires local user access to the system.
The exploitation of CVE-2006-1797 occurs when a local user attempts to use the SIOCGIFALIAS ioctl on a non-existent alias.