Vulnerability Details : CVE-2006-4342
Potential exploit
The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
Vulnerability category: Denial of service
Products affected by CVE-2006-4342
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4342
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4342
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:L/AC:H/Au:N/C:N/I:N/A:C |
1.9
|
6.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-02-15 |
CWE ids for CVE-2006-4342
-
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-4342
-
http://www.redhat.com/support/errata/RHSA-2006-0710.html
SupportBroken Link
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618
205618 – CVE-2006-4342 shmat hangs by simultaneous shmctl(IPC_RMID)Exploit;Issue Tracking
-
http://secunia.com/advisories/23064
About Secunia Research | FlexeraBroken Link
-
http://www.kb.cert.org/vuls/id/245984
VU#245984 - The Red Hat Enterprise Linux 3 SMP Kernel fails to properly handle IPC shared-memoryThird Party Advisory;US Government Resource
-
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
ASA-2006-254 (RHSA-2006-0710)Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649
404 Not FoundBroken Link
-
http://secunia.com/advisories/22497
About Secunia Research | FlexeraBroken Link
Jump to