CVE-2006-4997

The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 Exploit Issue Tracking
http://secunia.com/advisories/22253 Broken Link Vendor Advisory
http://secunia.com/advisories/22279 Broken Link Patch Vendor Advisory
http://secunia.com/advisories/22292 Broken Link Patch Vendor Advisory
http://secunia.com/advisories/22497 Broken Link
http://secunia.com/advisories/22762 Broken Link
http://secunia.com/advisories/22945 Broken Link
http://secunia.com/advisories/23064 Broken Link
http://secunia.com/advisories/23370 Broken Link
http://secunia.com/advisories/23384 Broken Link
http://secunia.com/advisories/23395 Broken Link
http://secunia.com/advisories/23474 Broken Link
http://secunia.com/advisories/23752 Broken Link
http://secunia.com/advisories/23788 Broken Link
http://secunia.com/advisories/24288 Broken Link
http://secunia.com/advisories/25691 Broken Link
http://securitytracker.com/id?1017526 Broken Link Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm Third Party Advisory
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 Broken Link
http://www.novell.com/linux/security/advisories/2006_79_kernel.html Broken Link
http://www.redhat.com/support/errata/RHSA-2006-0689.html Broken Link Patch
http://www.redhat.com/support/errata/RHSA-2006-0710.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0012.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0013.html Broken Link
http://www.securityfocus.com/archive/1/471457 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/20363 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-395-1 Third Party Advisory
http://www.us.debian.org/security/2006/dsa-1233 Broken Link
http://www.us.debian.org/security/2006/dsa-1237 Broken Link
http://www.vupen.com/english/advisories/2006/3937 Broken Link
http://www.vupen.com/english/advisories/2006/3999 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-10-10 04:06

Updated : 2024-02-10 02:45


NVD link : CVE-2006-4997

Mitre link : CVE-2006-4997

CVE.ORG link : CVE-2006-4997


JSON object : View

Products Affected

redhat

  • enterprise_linux

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free