CVE-2006-7215

The Intel Core 2 Extreme processor X6800 and Core 2 Duo desktop processor E6000 and E4000 incorrectly set the memory page Access (A) bit for a page in certain circumstances involving proximity of the code segment limit to the end of a code page, which has unknown impact and attack vectors on certain operating systems other than OpenBSD, aka AI90.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:intel:core_2_duo_e4000:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_2_duo_e6000:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_2_extreme_x6800:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:24

Type Values Removed Values Added
References () http://download.intel.com/design/processor/specupdt/31327914.pdf - () http://download.intel.com/design/processor/specupdt/31327914.pdf -
References () http://marc.info/?l=openbsd-misc&m=118296441702631&w=2 - () http://marc.info/?l=openbsd-misc&m=118296441702631&w=2 -
References () http://seclists.org/fulldisclosure/2007/Jun/0605.html - () http://seclists.org/fulldisclosure/2007/Jun/0605.html -
References () http://www.geek.com/images/geeknews/2006Jan/core_duo_errata__2006_01_21__full.gif - () http://www.geek.com/images/geeknews/2006Jan/core_duo_errata__2006_01_21__full.gif -
References () http://www.matasano.com/log/894/theo-de-raadt-intel-core-2-bugs-assuredly-exploitable-from-userland/ - () http://www.matasano.com/log/894/theo-de-raadt-intel-core-2-bugs-assuredly-exploitable-from-userland/ -
References () http://www.securityfocus.com/bid/24702 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/24702 - Patch, Vendor Advisory

Information

Published : 2007-07-03 21:30

Updated : 2024-11-21 00:24


NVD link : CVE-2006-7215

Mitre link : CVE-2006-7215

CVE.ORG link : CVE-2006-7215


JSON object : View

Products Affected

intel

  • core_2_duo_e6000
  • core_2_extreme_x6800
  • core_2_duo_e4000