artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://dot.kde.org/1150310128/ - Not Applicable | |
References | () http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List | |
References | () http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/25032 - Broken Link | |
References | () http://secunia.com/advisories/25059 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory | |
References | () http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory | |
References | () http://www.kde.org/info/security/advisory-20060614-2.txt - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory | |
References | () http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link | |
References | () http://www.osvdb.org/26506 - Broken Link | |
References | () http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2006/2357 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2007/0409 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry |
21 Jan 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-273 | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
References | (OSVDB) http://www.osvdb.org/26506 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/0409 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://dot.kde.org/1150310128/ - Not Applicable | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/25032 - Broken Link | |
References | (MLIST) http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List | |
References | (SECTRACK) http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/2357 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/25059 - Broken Link |
Information
Published : 2006-06-15 10:02
Updated : 2024-11-21 00:12
NVD link : CVE-2006-2916
Mitre link : CVE-2006-2916
CVE.ORG link : CVE-2006-2916
JSON object : View
Products Affected
kde
- arts
linux
- linux_kernel
CWE
CWE-273
Improper Check for Dropped Privileges