CVE-2006-2916

artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
References
Link Resource
http://dot.kde.org/1150310128/ Not Applicable
http://mail.gnome.org/archives/beast/2006-December/msg00025.html Mailing List
http://secunia.com/advisories/20677 Broken Link Vendor Advisory
http://secunia.com/advisories/20786 Broken Link Vendor Advisory
http://secunia.com/advisories/20827 Broken Link Vendor Advisory
http://secunia.com/advisories/20868 Broken Link Vendor Advisory
http://secunia.com/advisories/20899 Broken Link Vendor Advisory
http://secunia.com/advisories/25032 Broken Link
http://secunia.com/advisories/25059 Broken Link
http://security.gentoo.org/glsa/glsa-200704-22.xml Third Party Advisory
http://securitytracker.com/id?1016298 Broken Link Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml Third Party Advisory
http://www.kde.org/info/security/advisory-20060614-2.txt Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 Third Party Advisory
http://www.novell.com/linux/security/advisories/2006_38_security.html Broken Link
http://www.osvdb.org/26506 Broken Link
http://www.securityfocus.com/archive/1/437362/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/18429 Broken Link Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23697 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/2357 Broken Link
http://www.vupen.com/english/advisories/2007/0409 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 Third Party Advisory VDB Entry
http://dot.kde.org/1150310128/ Not Applicable
http://mail.gnome.org/archives/beast/2006-December/msg00025.html Mailing List
http://secunia.com/advisories/20677 Broken Link Vendor Advisory
http://secunia.com/advisories/20786 Broken Link Vendor Advisory
http://secunia.com/advisories/20827 Broken Link Vendor Advisory
http://secunia.com/advisories/20868 Broken Link Vendor Advisory
http://secunia.com/advisories/20899 Broken Link Vendor Advisory
http://secunia.com/advisories/25032 Broken Link
http://secunia.com/advisories/25059 Broken Link
http://security.gentoo.org/glsa/glsa-200704-22.xml Third Party Advisory
http://securitytracker.com/id?1016298 Broken Link Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml Third Party Advisory
http://www.kde.org/info/security/advisory-20060614-2.txt Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 Third Party Advisory
http://www.novell.com/linux/security/advisories/2006_38_security.html Broken Link
http://www.osvdb.org/26506 Broken Link
http://www.securityfocus.com/archive/1/437362/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/18429 Broken Link Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23697 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/2357 Broken Link
http://www.vupen.com/english/advisories/2007/0409 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:kde:arts:1.0:*:*:*:*:*:*:*
cpe:2.3:a:kde:arts:1.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://dot.kde.org/1150310128/ - Not Applicable () http://dot.kde.org/1150310128/ - Not Applicable
References () http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List () http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List
References () http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory () http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory () http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory () http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory () http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory () http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/25032 - Broken Link () http://secunia.com/advisories/25032 - Broken Link
References () http://secunia.com/advisories/25059 - Broken Link () http://secunia.com/advisories/25059 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory
References () http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory
References () http://www.kde.org/info/security/advisory-20060614-2.txt - Patch, Vendor Advisory () http://www.kde.org/info/security/advisory-20060614-2.txt - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory
References () http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link () http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link
References () http://www.osvdb.org/26506 - Broken Link () http://www.osvdb.org/26506 - Broken Link
References () http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2006/2357 - Broken Link () http://www.vupen.com/english/advisories/2006/2357 - Broken Link
References () http://www.vupen.com/english/advisories/2007/0409 - Broken Link () http://www.vupen.com/english/advisories/2007/0409 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry

21 Jan 2024, 01:42

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-273
CVSS v2 : 6.0
v3 : unknown
v2 : 6.0
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References (OSVDB) http://www.osvdb.org/26506 - (OSVDB) http://www.osvdb.org/26506 - Broken Link
References (BID) http://www.securityfocus.com/bid/23697 - (BID) http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/20786 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/0409 - (VUPEN) http://www.vupen.com/english/advisories/2007/0409 - Broken Link
References (SECUNIA) http://secunia.com/advisories/20827 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry
References (CONFIRM) http://dot.kde.org/1150310128/ - Patch (CONFIRM) http://dot.kde.org/1150310128/ - Not Applicable
References (BUGTRAQ) http://www.securityfocus.com/archive/1/437362/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/20677 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/20868 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-200704-22.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/20899 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/18429 - Patch (BID) http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25032 - (SECUNIA) http://secunia.com/advisories/25032 - Broken Link
References (MLIST) http://mail.gnome.org/archives/beast/2006-December/msg00025.html - (MLIST) http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List
References (SECTRACK) http://securitytracker.com/id?1016298 - (SECTRACK) http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry
References (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory
References (SUSE) http://www.novell.com/linux/security/advisories/2006_38_security.html - (SUSE) http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2006/2357 - (VUPEN) http://www.vupen.com/english/advisories/2006/2357 - Broken Link
References (SECUNIA) http://secunia.com/advisories/25059 - (SECUNIA) http://secunia.com/advisories/25059 - Broken Link

Information

Published : 2006-06-15 10:02

Updated : 2024-11-21 00:12


NVD link : CVE-2006-2916

Mitre link : CVE-2006-2916

CVE.ORG link : CVE-2006-2916


JSON object : View

Products Affected

kde

  • arts

linux

  • linux_kernel
CWE
CWE-273

Improper Check for Dropped Privileges