CVE-2006-7203

Current Description

The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").

Basic Data

PublishedMay 14, 2007
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:H/Au:N/C:N/I:N/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score4.0
SeverityMEDIUM
Exploitability Score1.9
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********2.6.20

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel *

References

NameSourceURLTags
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=822191a2fa1584a29c3224ab328507adcaeac1abhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=822191a2fa1584CONFIRMExploit Vendor Advisory
RHSA-2007:0488http://rhn.redhat.com/errata/RHSA-2007-0488.htmlREDHAT
25682http://secunia.com/advisories/25682SECUNIA
25683http://secunia.com/advisories/25683SECUNIA
25700http://secunia.com/advisories/25700SECUNIA
25838http://secunia.com/advisories/25838SECUNIA
25961http://secunia.com/advisories/25961SECUNIA
26133http://secunia.com/advisories/26133SECUNIA
26139http://secunia.com/advisories/26139SECUNIA
26289http://secunia.com/advisories/26289SECUNIA
26620http://secunia.com/advisories/26620SECUNIA
29058http://secunia.com/advisories/29058SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htmhttp://support.avaya.com/elmodocs2/security/ASA-2007-287.htmCONFIRM
DSA-1504http://www.debian.org/security/2008/dsa-1504DEBIAN
MDKSA-2007:171http://www.mandriva.com/security/advisories?name=MDKSA-2007:171MANDRIVA
MDKSA-2007:196http://www.mandriva.com/security/advisories?name=MDKSA-2007:196MANDRIVA
SUSE-SA:2007:035http://www.novell.com/linux/security/advisories/2007_35_kernel.htmlSUSE
SUSE-SA:2007:043http://www.novell.com/linux/security/advisories/2007_43_kernel.htmlSUSE
USN-486-1http://www.ubuntu.com/usn/usn-486-1UBUNTU
USN-489-1http://www.ubuntu.com/usn/usn-489-1UBUNTU
ADV-2007-2209http://www.vupen.com/english/advisories/2007/2209VUPEN
oval:org.mitre.oval:def:10941https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10941OVAL
RHSA-2007:0376https://rhn.redhat.com/errata/RHSA-2007-0376.htmlREDHAT