First published: Thu Jun 15 2006(Updated: )
artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE aRts | =1.0 | |
KDE aRts | =1.2 | |
All of | ||
Any of | ||
KDE aRts | =1.0 | |
KDE aRts | =1.2 | |
Linux kernel | >=2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2916 is considered a high severity vulnerability due to its potential to allow local users to gain root privileges.
To mitigate CVE-2006-2916, ensure that aRts is not setuid or upgrade to newer versions of KDE aRts that address this vulnerability.
Users running KDE aRts version 1.0 or 1.2 on Linux kernels 2.6.0 or later are affected by CVE-2006-2916.
CVE-2006-2916 allows local users to gain root privileges by exploiting the improper handling of the setuid system call.
CVE-2006-2916 is specifically exploited in environments where aRts is configured to run with setuid root permissions on vulnerable Linux kernel versions.