Vulnerability Details : CVE-2006-1864
Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.
Vulnerability category: Directory traversal
Products affected by CVE-2006-1864
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
Threat overview for CVE-2006-1864
Top countries where our scanners detected CVE-2006-1864
Top open port discovered on systems with this issue
554
IPs affected by CVE-2006-1864 7
Find out if you* are
affected by CVE-2006-1864!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-1864
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1864
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2006-1864
-
http://www.ubuntu.com/usn/usn-302-1
USN-302-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu
-
http://www.securityfocus.com/archive/1/451419/100/200/threaded
-
http://www.redhat.com/support/errata/RHSA-2006-0710.html
Support
-
http://www.securityfocus.com/bid/17735
-
http://www.securityfocus.com/archive/1/451404/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11327
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
-
http://www.redhat.com/support/errata/RHSA-2006-0580.html
-
http://www.novell.com/linux/security/advisories/2006-05-31.html
-
http://www.vupen.com/english/advisories/2006/2554
-
http://www.vmware.com/download/esx/esx-254-200610-patch.html
Page not found
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26137
-
http://www.securityfocus.com/archive/1/451417/100/200/threaded
-
http://www.redhat.com/support/errata/RHSA-2006-0493.html
-
http://www.vupen.com/english/advisories/2006/4502
Site en construction
-
http://www.debian.org/security/2006/dsa-1103
-
http://www.vmware.com/download/esx/esx-202-200610-patch.html
Page not found
-
http://www.vmware.com/download/esx/esx-213-200610-patch.html
Page not found
-
http://www.redhat.com/support/errata/RHSA-2006-0579.html
-
http://www.trustix.org/errata/2006/0026
Trustix | Empowering Trust and Security in the Digital Age
-
http://www.securityfocus.com/archive/1/451426/100/200/threaded
-
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
-
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
ASA-2006-254 (RHSA-2006-0710)
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
-
http://www.debian.org/security/2006/dsa-1097
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189435
Exploit
Jump to