Vulnerability Description
net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local users to obtain portions of potentially sensitive memory.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.4.0 |
References
- http://marc.info/?l=linux-netdev&m=114148078223594&w=2
- http://secunia.com/advisories/19357
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/21035
- http://secunia.com/advisories/22875
- http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.redhat.com/support/errata/RHSA-2006-0579.html
- http://www.redhat.com/support/errata/RHSA-2006-0580.html
- http://www.securityfocus.com/archive/1/451404/100/0/threaded
- http://www.securityfocus.com/archive/1/451417/100/200/threaded
- http://www.securityfocus.com/archive/1/451419/100/200/threaded
- http://www.securityfocus.com/archive/1/451426/100/200/threaded
- http://www.securityfocus.com/bid/17203
- http://www.vmware.com/download/esx/esx-202-200610-patch.html
FAQ
What is CVE-2006-1342?
CVE-2006-1342 is a vulnerability with a CVSS score of 2.1 (LOW). net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local us...
How severe is CVE-2006-1342?
CVE-2006-1342 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1342?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.