Vulnerability Details : CVE-2006-7203
Potential exploit
The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2006-7203
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Threat overview for CVE-2006-7203
Top countries where our scanners detected CVE-2006-7203
Top open port discovered on systems with this issue
80
IPs affected by CVE-2006-7203 1,103
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-7203!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-7203
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-7203
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:L/AC:H/Au:N/C:N/I:N/A:C |
1.9
|
6.9
|
NIST |
References for CVE-2006-7203
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
-
http://www.ubuntu.com/usn/usn-489-1
-
http://secunia.com/advisories/25683
-
http://rhn.redhat.com/errata/RHSA-2007-0488.html
RHSA-2007:0488 - Security Advisory - Red Hat Customer Portal
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff_plain%3Bh=822191a2fa1584a29c3224ab328507adcaeac1ab
-
https://rhn.redhat.com/errata/RHSA-2007-0376.html
-
http://secunia.com/advisories/25961
-
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
-
http://www.ubuntu.com/usn/usn-486-1
-
http://www.vupen.com/english/advisories/2007/2209
-
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
ASA-2007-287 (RHSA-2007-0488)
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=822191a2fa1584a29c3224ab328507adcaeac1ab
Exploit;Vendor Advisory
-
http://secunia.com/advisories/26620
-
http://secunia.com/advisories/29058
-
http://www.debian.org/security/2008/dsa-1504
-
http://secunia.com/advisories/26139
-
http://secunia.com/advisories/25700
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10941
-
http://secunia.com/advisories/26289
About Secunia Research | Flexera
-
http://secunia.com/advisories/25838
About Secunia Research | Flexera
-
http://www.novell.com/linux/security/advisories/2007_43_kernel.html
-
http://secunia.com/advisories/25682
-
http://secunia.com/advisories/26133
Jump to