vendor:
Linux Kernel
by:
Marco Ivaldi
7,2
CVSS
HIGH
suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24
264
CWE
Product Name: Linux Kernel
Affected Version From: 2.6.13
Affected Version To: 2.6.17.4, 2.6.16.24
Patch Exists: YES
Related CWE: CVE-2006-2451
CPE: 2.6.13
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: SuSE Linux 2.6.13-15.8-default
2006
raptor_prctl2.c – Linux 2.6.x suid_dumpable2 (logrotate)
The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and POSSIBLY (yeah, sure;) gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions (CVE-2006-2451).
Mitigation:
Ensure that the PR_SET_DUMPABLE argument of the prctl function is not used in a program that causes a core dump file to be created in a directory for which the user does not have permissions.