Vulnerability Description
The elf_load_file function in NetBSD 2.0 through 3.0 allows local users to cause a denial of service (kernel crash) via an ELF interpreter that does not have a PT_LOAD section in its header, which triggers a null dereference.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Netbsd | 2.0 |
References
- ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-008.txt.ascPatchVendor Advisory
- http://securitytracker.com/id?1015848Patch
- http://www.osvdb.org/24576
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25690
- ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-008.txt.ascPatchVendor Advisory
- http://securitytracker.com/id?1015848Patch
- http://www.osvdb.org/24576
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25690
FAQ
What is CVE-2006-1589?
CVE-2006-1589 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The elf_load_file function in NetBSD 2.0 through 3.0 allows local users to cause a denial of service (kernel crash) via an ELF interpreter that does not have a PT_LOAD section in its header, which tri...
How severe is CVE-2006-1589?
CVE-2006-1589 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1589?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Netbsd.