CVE-2006-0744

Scores

EPSS

0.001very_low0.1%
0%20%40%60%80%100%

Percentile: 0.1%

CVSS

4.9medium2.0
0246810

CVSS Score: 4.9/10

All CVSS Scores

CVSS 2.0
4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Description

Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-20

Exploits

Exploit ID: 1880

Source: exploitdb

URL: https://www.exploit-db.com/exploits/1880

Exploit ID: 2004

Source: exploitdb

URL: https://www.exploit-db.com/exploits/2004

Exploit ID: 2005

Source: exploitdb

URL: https://www.exploit-db.com/exploits/2005

Exploit ID: 2006

Source: exploitdb

URL: https://www.exploit-db.com/exploits/2006

Exploit ID: 2011

Source: exploitdb

URL: https://www.exploit-db.com/exploits/2011

Exploit ID: 2031

Source: exploitdb

URL: https://www.exploit-db.com/exploits/2031

Vulnerable Software (4)

Type: Configuration

Product: kernel

Operating System: rhel 3

Trait:
{  "fixed": "2.4.21-47.EL"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 4

Trait:
{  "fixed": "2.6.9-34.0.1.EL"}

Source: redhat

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "fixed": "2.6.16-7"}

Source: debian

Type: Configuration

Vendor: *

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*...

Source: nvd

End of list