First published: Tue Sep 26 2006(Updated: )
Integer overflow vulnerability in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2006-4178.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =5.2.1 | |
FreeBSD Kernel | =5.4 | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | <=5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4172 is considered a high severity vulnerability due to its potential to cause denial of service and allow arbitrary code execution.
To fix CVE-2006-4172, users should upgrade to the latest supported version of FreeBSD beyond 5.5, where this vulnerability is patched.
CVE-2006-4172 affects local users on FreeBSD versions up to and including 5.5, including versions 5.2, 5.3, and 5.4.
Exploiting CVE-2006-4172 can lead to a denial of service by crashing the system and may also allow execution of arbitrary code.
Yes, CVE-2006-4172 is identified as a different vulnerability from CVE-2006-4178, each with its own specific implications.