CVE-2006-2916

artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
References
Link Resource
http://dot.kde.org/1150310128/ Not Applicable
http://mail.gnome.org/archives/beast/2006-December/msg00025.html Mailing List
http://secunia.com/advisories/20677 Broken Link Vendor Advisory
http://secunia.com/advisories/20786 Broken Link Vendor Advisory
http://secunia.com/advisories/20827 Broken Link Vendor Advisory
http://secunia.com/advisories/20868 Broken Link Vendor Advisory
http://secunia.com/advisories/20899 Broken Link Vendor Advisory
http://secunia.com/advisories/25032 Broken Link
http://secunia.com/advisories/25059 Broken Link
http://security.gentoo.org/glsa/glsa-200704-22.xml Third Party Advisory
http://securitytracker.com/id?1016298 Broken Link Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml Third Party Advisory
http://www.kde.org/info/security/advisory-20060614-2.txt Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 Third Party Advisory
http://www.novell.com/linux/security/advisories/2006_38_security.html Broken Link
http://www.osvdb.org/26506 Broken Link
http://www.securityfocus.com/archive/1/437362/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/18429 Broken Link Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23697 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/2357 Broken Link
http://www.vupen.com/english/advisories/2007/0409 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:kde:arts:1.0:*:*:*:*:*:*:*
cpe:2.3:a:kde:arts:1.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Jan 2024, 01:42

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () http://dot.kde.org/1150310128/ - Patch () http://dot.kde.org/1150310128/ - Not Applicable
References () http://mail.gnome.org/archives/beast/2006-December/msg00025.html - () http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List
References () http://secunia.com/advisories/20677 - Vendor Advisory () http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20786 - Vendor Advisory () http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20827 - Vendor Advisory () http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20868 - Vendor Advisory () http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/20899 - Vendor Advisory () http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/25032 - () http://secunia.com/advisories/25032 - Broken Link
References () http://secunia.com/advisories/25059 - () http://secunia.com/advisories/25059 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200704-22.xml - () http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory
References () http://securitytracker.com/id?1016298 - () http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - () http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory
References () http://www.novell.com/linux/security/advisories/2006_38_security.html - () http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link
References () http://www.osvdb.org/26506 - () http://www.osvdb.org/26506 - Broken Link
References () http://www.securityfocus.com/archive/1/437362/100/0/threaded - () http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/18429 - Patch () http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/23697 - () http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2006/2357 - () http://www.vupen.com/english/advisories/2006/2357 - Broken Link
References () http://www.vupen.com/english/advisories/2007/0409 - () http://www.vupen.com/english/advisories/2007/0409 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry
CVSS v2 : 6.0
v3 : unknown
v2 : 6.0
v3 : 7.8
CWE NVD-CWE-Other CWE-273
First Time Linux linux Kernel
Linux

Information

Published : 2006-06-15 10:02

Updated : 2024-01-21 01:42


NVD link : CVE-2006-2916

Mitre link : CVE-2006-2916

CVE.ORG link : CVE-2006-2916


JSON object : View

Products Affected

kde

  • arts

linux

  • linux_kernel
CWE
CWE-273

Improper Check for Dropped Privileges