First published: Fri Jun 30 2006(Updated: )
spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind function calls. NOTE: spread deletes this temporary file before use, which could cause conflicts with other programs that use the same filename, but this is not a distinct issue.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Spread |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3118 has a moderate severity rating as it can lead to a denial of service.
To fix CVE-2006-3118, ensure that the software is updated to a version that mitigates the race condition issue.
Users of the Canonical Spread software are affected by CVE-2006-3118.
The impact of CVE-2006-3118 is a potential denial of service due to a race condition on temporary files.
CVE-2006-3118 is not remotely exploitable as it requires local user access to the system.