CVE-2006-2916
Published Jun 15, 2006
Last updated 10 months ago
Overview
- Description
- artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 10
- Exploitability score
- 1.5
- Vector string
- AV:L/AC:H/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-273
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Vendor comments
- Red HatNot vulnerable. We do not ship aRts as setuid root on Red Hat Enterprise Linux 2.1, 3, or 4.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:arts:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECA4B1F0-C924-4308-862F-0FE65D7BAB4D" }, { "criteria": "cpe:2.3:a:kde:arts:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC2D979D-0731-4CE3-9D16-22EF314884A2" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC4FB0A3-C8CC-4AB5-8A9D-EF370368B1EB", "versionStartIncluding": "2.6.0" } ], "operator": "OR" } ], "operator": "AND" } ]