Vulnerability Description
spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind function calls. NOTE: spread deletes this temporary file before use, which could cause conflicts with other programs that use the same filename, but this is not a distinct issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Spread | All versions |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375617
- http://www.securityfocus.com/bid/18675
- https://launchpad.net/distros/ubuntu/+source/spread/+bug/44171
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375617
- http://www.securityfocus.com/bid/18675
- https://launchpad.net/distros/ubuntu/+source/spread/+bug/44171
FAQ
What is CVE-2006-3118?
CVE-2006-3118 is a vulnerability with a CVSS score of 1.2 (LOW). spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind...
How severe is CVE-2006-3118?
CVE-2006-3118 has been rated LOW with a CVSS base score of 1.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3118?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Spread.