artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
References
Configurations
History
21 Jan 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200704-22.xml - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/18429 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/23697 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/20899 - Broken Link, Vendor Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/437362/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/25059 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/20827 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://dot.kde.org/1150310128/ - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/25032 - Broken Link | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2006_38_security.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/20868 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/0409 - Broken Link | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/27221 - Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/2357 - Broken Link | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:107 - Third Party Advisory | |
References | (MLIST) http://mail.gnome.org/archives/beast/2006-December/msg00025.html - Mailing List | |
References | (SECTRACK) http://securitytracker.com/id?1016298 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/20786 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/20677 - Broken Link, Vendor Advisory | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256 - Mailing List, Third Party Advisory | |
References | (OSVDB) http://www.osvdb.org/26506 - Broken Link | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 7.8 |
CWE | CWE-273 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2006-06-15 10:02
Updated : 2024-01-21 01:42
NVD link : CVE-2006-2916
Mitre link : CVE-2006-2916
JSON object : View
Products Affected
linux
- linux_kernel
kde
- arts
CWE
CWE-273
Improper Check for Dropped Privileges