Vulnerability Description
Rocks Clusters 4.1 and earlier allows local users to gain privileges via commands enclosed with escaped backticks (\`) in an argument to the (1) mount-loop (mount-loop.c) or (2) umount-loop (umount-loop.c) command, which is not filtered in a system function call.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rocks Clusters | Rocks Clusters | <= 4.1 |
References
- http://secunia.com/advisories/21065PatchVendor Advisory
- http://securityreason.com/securityalert/1242
- http://www.securityfocus.com/archive/1/440126/100/0/threaded
- http://www.securityfocus.com/bid/19003ExploitPatch
- http://www.vupen.com/english/advisories/2006/2833
- http://xavier.tigerteam.se/advisories/TSEAD-200606-6.txt
- http://xavier.tigerteam.se/exploits/rocksmountdirty.shExploit
- http://xavier.tigerteam.se/exploits/rocksumountdirty.pyExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27758
- http://secunia.com/advisories/21065PatchVendor Advisory
- http://securityreason.com/securityalert/1242
- http://www.securityfocus.com/archive/1/440126/100/0/threaded
- http://www.securityfocus.com/bid/19003ExploitPatch
- http://www.vupen.com/english/advisories/2006/2833
- http://xavier.tigerteam.se/advisories/TSEAD-200606-6.txt
FAQ
What is CVE-2006-3693?
CVE-2006-3693 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Rocks Clusters 4.1 and earlier allows local users to gain privileges via commands enclosed with escaped backticks (\`) in an argument to the (1) mount-loop (mount-loop.c) or (2) umount-loop (umount-lo...
How severe is CVE-2006-3693?
CVE-2006-3693 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3693?
Check the references section above for vendor advisories and patch information. Affected products include: Rocks Clusters Rocks Clusters.