First published: Sat Sep 09 2006(Updated: )
** DISPUTED ** The source code tar archive of the Linux kernel 2.6.16, 2.6.17.11, and possibly other versions specifies weak permissions (0666 and 0777) for certain files and directories, which might allow local users to insert Trojan horse source code that would be used during the next kernel compilation. NOTE: another researcher disputes the vulnerability, stating that he finds "Not a single world-writable file or directory." CVE analysis as of 20060908 indicates that permissions will only be weak under certain unusual or insecure scenarios.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.16 | |
Linux Kernel | =2.6.17.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4663 is considered a medium severity vulnerability due to the potential for local users to exploit weak permissions.
To fix CVE-2006-4663, update to a patched version of the Linux kernel that addresses the weak permissions issue.
CVE-2006-4663 affects Linux kernel versions 2.6.16 and 2.6.17.11, among possibly others.
CVE-2006-4663 is a local vulnerability, meaning it requires local access to exploit.
CVE-2006-4663 can allow local users to insert Trojan horse source code into the kernel, potentially compromising system integrity.