First published: Fri Dec 08 2006(Updated: )
Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Pro 10/100 Adapters | <=3.5.14 | |
Intel Pro 10/100 Adapters | <=4.0.3 | |
Intel Pro 10/100 Adapters | <=8.0.27.0 | |
Intel Pro 1000 PCIe Adapters | <=7.2.7 | |
Intel Pro 1000 PCIe Adapters | <=8.7.1.0 | |
Intel Pro 1000 PCIe Adapters | <=9.0.15 | |
Intel Pro 1000 PCIe Adapters | <=9.1.30.0 | |
Intel Pro 10GbE Adapters | <=1.0.109 | |
<=3.5.14 | ||
<=4.0.3 | ||
<=8.0.27.0 | ||
<=7.2.7 | ||
<=8.7.1.0 | ||
<=9.0.15 | ||
<=9.1.30.0 | ||
<=1.0.109 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6385 is considered to have high severity due to its potential for local users to execute arbitrary code with kernel-level privileges.
To fix CVE-2006-6385, users should upgrade their Intel PRO network adapter drivers to a version released after December 5, 2006.
CVE-2006-6385 affects various Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapters.
CVE-2006-6385 cannot be exploited remotely as it requires local user access to execute the vulnerability.
CVE-2006-6385 is classified as a stack-based buffer overflow vulnerability.