LOW · 1.2

CVE-2006-3118

spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind...

Vulnerability Description

spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind function calls. NOTE: spread deletes this temporary file before use, which could cause conflicts with other programs that use the same filename, but this is not a distinct issue.

CVSS Score

1.2

LOW

AV:L/AC:H/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
CanonicalSpreadAll versions

References

FAQ

What is CVE-2006-3118?

CVE-2006-3118 is a vulnerability with a CVSS score of 1.2 (LOW). spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind...

How severe is CVE-2006-3118?

CVE-2006-3118 has been rated LOW with a CVSS base score of 1.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-3118?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Spread.