Vulnerability Details : CVE-2006-6655
The procfs implementation in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was mounted with mount_procfs -o linux, which results in a NULL pointer dereference.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2006-6655
- cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6655
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6655
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.7
|
LOW | AV:L/AC:L/Au:S/C:N/I:N/A:P |
3.1
|
2.9
|
NIST |
References for CVE-2006-6655
Jump to