First published: Fri Jun 02 2006(Updated: )
The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =5.4-releng | |
FreeBSD Kernel | =6.1 | |
FreeBSD Kernel | =5.3-release | |
FreeBSD Kernel | =5.4 | |
FreeBSD Kernel | =6.1-stable | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =6.1-release | |
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =5.4-stable | |
FreeBSD Kernel | =5.4-pre-release | |
FreeBSD Kernel | =6.0-release | |
FreeBSD Kernel | =5.4-release | |
FreeBSD Kernel | =6.0-stable | |
FreeBSD Kernel | =5.3-stable | |
FreeBSD Kernel | =5.3-releng |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2655 is considered to have a critical severity level due to the potential for remote attackers to bypass access restrictions.
To fix CVE-2006-2655, you should upgrade your FreeBSD installation to a version that is not affected, specifically versions beyond 6.1.
CVE-2006-2655 affects FreeBSD versions 5.3 to 6.1, including their various releases and stable versions.
Exploitation of CVE-2006-2655 could allow remote attackers to bypass intended access controls, potentially leading to unauthorized access.
CVE-2006-2655 accidentally disables access restrictions in the ypserv build process, making it vulnerable to remote exploitation.