First published: Wed Dec 13 2006(Updated: )
Stack-based buffer overflow in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via large precision padding values in a format string specifier in the format parameter of the doprf function. NOTE: this issue normally does not cross privilege boundaries, except in cases of external introduction of malicious message files, or if it is leveraged with other vulnerabilities such as CVE-2006-6494.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SunOS | =5.8 | |
Oracle Solaris and Zettabyte File System (ZFS) | =10.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =9.0 | |
=9.0 | ||
=10.0 | ||
=5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6495 is rated as a medium severity vulnerability due to the potential for local users to execute arbitrary code.
To fix CVE-2006-6495, it is recommended to apply the relevant security patches provided by Oracle for Solaris 8, 9, and 10.
CVE-2006-6495 affects local users on Sun Solaris versions 8, 9, and 10 running on SPARC architecture.
CVE-2006-6495 is a stack-based buffer overflow vulnerability found in the ld.so.1 library.
No, CVE-2006-6495 typically does not allow remote exploitation as it requires local access to the system.