First published: Tue Dec 26 2006(Updated: )
OpenBSD and NetBSD permit usermode code to kill the display server and write to the X.Org /dev/xf86 device, which allows local users with root privileges to reduce securelevel by replacing the System Management Mode (SMM) handler via a write to an SMRAM address within /dev/xf86 (aka the video card memory-mapped I/O range), and then launching the new handler via a System Management Interrupt (SMI), as demonstrated by a write to Programmed I/O port 0xB2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | =2.0.4 | |
OpenBSD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6730 is considered a high severity vulnerability due to its potential impact on system security.
To mitigate CVE-2006-6730, ensure that your system is updated to the latest secure versions of OpenBSD or NetBSD which address this vulnerability.
CVE-2006-6730 affects certain versions of OpenBSD and NetBSD systems.
CVE-2006-6730 is a local privilege escalation vulnerability, meaning it cannot be exploited remotely.
Local users with root privileges on affected systems are primarily at risk from CVE-2006-6730.