Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-6385
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-08 Dec, 2006 | 01:28
Updated At-17 Oct, 2018 | 21:48

Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Intel Corporation
intel
>>pro_10_100_adapters>>Versions up to 3.5.14(inclusive)
cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_10_100_adapters>>Versions up to 4.0.3(inclusive)
cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_10_100_adapters>>Versions up to 8.0.27.0(inclusive)
cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_1000_adapters>>Versions up to 7.2.7(inclusive)
cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_1000_adapters>>Versions up to 8.7.1.0(inclusive)
cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_1000_adapters>>Versions up to 9.0.15(inclusive)
cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_1000_pcie_adapters>>Versions up to 9.1.30.0(inclusive)
cpe:2.3:h:intel:pro_1000_pcie_adapters:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>pro_10gbe_adapters>>Versions up to 1.0.109(inclusive)
cpe:2.3:h:intel:pro_10gbe_adapters:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2006-12-08T00:00:00

Not Vulnerable. eEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows.

References
HyperlinkSourceResource
http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.htmlcve@mitre.org
N/A
http://research.eeye.com/html/advisories/published/AD20061207.htmlcve@mitre.org
N/A
http://research.eeye.com/html/advisories/upcoming/20060710.htmlcve@mitre.org
N/A
http://secunia.com/advisories/23221cve@mitre.org
Vendor Advisory
http://securityreason.com/securityalert/2007cve@mitre.org
N/A
http://securitytracker.com/id?1017346cve@mitre.org
N/A
http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.htmlcve@mitre.org
N/A
http://www.intel.com/support/network/sb/CS-023726.htmcve@mitre.org
Patch
http://www.kb.cert.org/vuls/id/296681cve@mitre.org
US Government Resource
http://www.securityfocus.com/archive/1/453852/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/21456cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2006/4871cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/30750cve@mitre.org
N/A
Hyperlink: http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://research.eeye.com/html/advisories/published/AD20061207.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://research.eeye.com/html/advisories/upcoming/20060710.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/23221
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/2007
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017346
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.intel.com/support/network/sb/CS-023726.htm
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.kb.cert.org/vuls/id/296681
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.securityfocus.com/archive/1/453852/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/21456
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4871
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/30750
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found