CVE-2006-6385
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/12/2006
Last modified:
09/04/2025
Description
Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:* | 3.5.14 (including) | |
| cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:* | 4.0.3 (including) | |
| cpe:2.3:h:intel:pro_10_100_adapters:*:*:*:*:*:*:*:* | 8.0.27.0 (including) | |
| cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:* | 7.2.7 (including) | |
| cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:* | 8.7.1.0 (including) | |
| cpe:2.3:h:intel:pro_1000_adapters:*:*:*:*:*:*:*:* | 9.0.15 (including) | |
| cpe:2.3:h:intel:pro_1000_pcie_adapters:*:*:*:*:*:*:*:* | 9.1.30.0 (including) | |
| cpe:2.3:h:intel:pro_10gbe_adapters:*:*:*:*:*:*:*:* | 1.0.109 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
- http://research.eeye.com/html/advisories/published/AD20061207.html
- http://research.eeye.com/html/advisories/upcoming/20060710.html
- http://secunia.com/advisories/23221
- http://securityreason.com/securityalert/2007
- http://securitytracker.com/id?1017346=
- http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
- http://www.intel.com/support/network/sb/CS-023726.htm
- http://www.kb.cert.org/vuls/id/296681
- http://www.securityfocus.com/archive/1/453852/100/0/threaded
- http://www.securityfocus.com/bid/21456
- http://www.vupen.com/english/advisories/2006/4871
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30750
- http://lists.freebsd.org/pipermail/freebsd-security/2006-December/004186.html
- http://research.eeye.com/html/advisories/published/AD20061207.html
- http://research.eeye.com/html/advisories/upcoming/20060710.html
- http://secunia.com/advisories/23221
- http://securityreason.com/securityalert/2007
- http://securitytracker.com/id?1017346=
- http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html
- http://www.intel.com/support/network/sb/CS-023726.htm
- http://www.kb.cert.org/vuls/id/296681
- http://www.securityfocus.com/archive/1/453852/100/0/threaded
- http://www.securityfocus.com/bid/21456
- http://www.vupen.com/english/advisories/2006/4871
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30750



