First published: Wed Dec 20 2006(Updated: )
The sendmsg function in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029, when run on a 64-bit architecture, allows attackers to cause a denial of service (kernel panic) via an invalid msg_controllen parameter to the sendit function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | =2.0 | |
NetBSD current | =2.1 | |
NetBSD current | =3.0 | |
NetBSD current | =3.0.1 | |
=2.0 | ||
=2.1 | ||
=3.0 | ||
=3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6654 is classified as a high severity vulnerability due to its potential to cause a kernel panic.
To mitigate CVE-2006-6654, update your NetBSD system to the latest patched version that addresses this vulnerability.
CVE-2006-6654 affects NetBSD versions 2.0, 2.1, 3.0, and 3.0.1 running on 64-bit architectures.
CVE-2006-6654 allows attackers to exploit an invalid msg_controllen parameter, leading to a denial of service.
CVE-2006-6654 was disclosed in October 2006, affecting specific versions of NetBSD.