First published: Fri Dec 08 2006(Updated: )
** DISPUTED ** Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operations. This issue is not a vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.2-stable | |
NetBSD current | =2.0.4 | |
OpenBSD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6397 is disputed regarding its severity, but it primarily affects local user memory modification.
The best mitigation for CVE-2006-6397 is to apply the latest patches for FreeBSD, NetBSD, and OpenBSD.
CVE-2006-6397 affects FreeBSD, NetBSD, and OpenBSD, particularly specific versions of these systems.
CVE-2006-6397 is not considered exploitable remotely as the banner utility is not setuid.
CVE-2006-6397 is an integer overflow vulnerability that may allow local users to alter memory.