Vulnerability Description
Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operations. This issue is not a vulnerability
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 6.2 |
| Netbsd | Netbsd | 2.0.4 |
| Openbsd | Openbsd | All versions |
References
- http://www.securityfocus.com/archive/1/452322/100/200/threaded
- http://www.securityfocus.com/archive/1/452330/100/200/threaded
- http://www.securityfocus.com/archive/1/452374/100/200/threaded
- http://www.securityfocus.com/archive/1/452470/100/200/threaded
- http://www.securityfocus.com/archive/1/452322/100/200/threaded
- http://www.securityfocus.com/archive/1/452330/100/200/threaded
- http://www.securityfocus.com/archive/1/452374/100/200/threaded
- http://www.securityfocus.com/archive/1/452470/100/200/threaded
FAQ
What is CVE-2006-6397?
CVE-2006-6397 is a vulnerability with a CVSS score of 4.4 (MEDIUM). Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner i...
How severe is CVE-2006-6397?
CVE-2006-6397 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6397?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd, Netbsd Netbsd, Openbsd Openbsd.