Two major vulnerabilities in Kernel v2.6.x.
On Friday July 14th, 2006 an exploit was widely posted for a vulnerability in the Linux 2.6 kernel, CVE-2006-3626 and CVE-2006-2451, which attempts to allow a local user to gain root privileges. The exploit relies on the kernel supporting the a.out binary format.
These two vulnerabilities do not affect Red Hat Enterprise Linux v2.1 or v3 as they are based on v2.4 kernels.
Those two vulnerabilities allows anyone to gain full root access to your server. A remote shell (SSH) access is not required in this case, a simple FTP or bad/insecure Php script is enough to gain root access to your server.
- CVE-2006-2451
This vulnerability was fixed in version 2.6.17.4 of the Linux kernel. For more information, go to:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451
- CVE-2006-3626
This vulnerability was fixed in version 2.6.17.5 of the Linux kernel. For more information, go to:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-3626
On Friday July 14th, 2006 an exploit was widely posted for a vulnerability in the Linux 2.6 kernel, CVE-2006-3626 and CVE-2006-2451, which attempts to allow a local user to gain root privileges. The exploit relies on the kernel supporting the a.out binary format.
These two vulnerabilities do not affect Red Hat Enterprise Linux v2.1 or v3 as they are based on v2.4 kernels.
Those two vulnerabilities allows anyone to gain full root access to your server. A remote shell (SSH) access is not required in this case, a simple FTP or bad/insecure Php script is enough to gain root access to your server.
- CVE-2006-2451
This vulnerability was fixed in version 2.6.17.4 of the Linux kernel. For more information, go to:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451
- CVE-2006-3626
This vulnerability was fixed in version 2.6.17.5 of the Linux kernel. For more information, go to:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-3626
Last edited by a moderator: