2.1
CWE
NVD-CWE-Other 190
Advisory Published
Updated

CVE-2006-6013: Integer Overflow

First published: Tue Nov 21 2006(Updated: )

Integer signedness error in the fw_ioctl (FW_IOCTL) function in the FireWire (IEEE-1394) drivers (dev/firewire/fwdev.c) in various BSD kernels, including DragonFlyBSD, FreeBSD 5.5, MidnightBSD 0.1-CURRENT before 20061115, NetBSD-current before 20061116, NetBSD-4 before 20061203, and TrustedBSD, allows local users to read arbitrary memory contents via certain negative values of crom_buf->len in an FW_GCROM command. NOTE: this issue has been labeled as an integer overflow, but it is more like an integer signedness error.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
MidnightBSD=0.1-current
NetBSD NetBSD=2.0.4
FreeBSD FreeBSD=5.5
DragonFlyBSD
trustedbsd trustedbsd

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-6013?

    CVE-2006-6013 is considered to have a moderate severity due to potential denial of service vulnerabilities.

  • How do I fix CVE-2006-6013?

    To fix CVE-2006-6013, users should upgrade to the latest versions of affected BSD operating systems that contain the relevant patches.

  • Which BSD versions are affected by CVE-2006-6013?

    CVE-2006-6013 affects various BSD kernels including DragonFlyBSD, FreeBSD 5.5, MidnightBSD 0.1-CURRENT, and NetBSD versions prior to specified patches.

  • What type of vulnerability is CVE-2006-6013?

    CVE-2006-6013 is classified as an integer signedness error within the FireWire drivers.

  • Can CVE-2006-6013 be exploited remotely?

    Yes, CVE-2006-6013 can potentially be exploited remotely if specific conditions are met, making certain systems vulnerable to denial of service.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203