ID

VAR-200612-0565


CVE

CVE-2006-6385


TITLE

Intel network drivers privilege escalation vulnerability

Trust: 0.8

sources: CERT/CC: VU#296681

DESCRIPTION

Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers. Intel PRO Ethernet The driver contains a buffer overflow vulnerability. This can lead to arbitrary code execution on the local machine.A local user may execute arbitrary code with system privileges on the local machine. An attacker can trigger this issue to corrupt memory and to execute code with kernel-level privileges. A successful attack can result in a complete compromise of the affected computer due to privilege escalation. All PCI, PCI-X, and PCIe Intel network adapter drivers are vulnerable. Intel Pro 100/1000 is a series of network card devices launched by Intel. Although the NDIS miniport driver occupies a low level, unprivileged userland code can still communicate with the driver through NIC statistics requests that need to be implemented by NDIS. If an attacker can send an IOCTL_NDIS_QUERY_SELECTED_STATS (0x17000E) request to \Device\{adapterguid}, it will cause NDIS.SYS to call the QueryInformationHandler routine registered by the miniport driver when calling NdisMRegisterMiniport. The input buffer provided by this IOCTL is a list of 32-bit OIDs related to statistics, each of which is passed independently to the QueryInformationHandler, which contains the code required to retrieve the statistics and return them to the output buffer. Under Windows 2000, pointers to user-supplied buffers are passed directly to the miniport driver, which means the data is user-controllable. Under Windows XP and later versions, the pointer is transferred to a temporary buffer containing undefined data in the kernel memory, so the pool memory must be controlled before the attack to control the above data. A processor with OID 0xFF0203FC copies the output buffer's string to a stack variable using the following strcpy operation: strcpy(&(var_1D4.sz_62), (char*)InformationBuffer + 4) Thus, an attacker can String causes the processor to completely overwrite the return address of the function, redirecting execution flow to an arbitrary user-mode or kernel-mode address. The attack string must be at offset +0x0C in the output buffer, as NDIS itself uses the first 8 bytes. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Intel LAN Driver Unspecified Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA23221 VERIFY ADVISORY: http://secunia.com/advisories/23221/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: Intel PRO 10/100 Adapters (Linux) 3.x http://secunia.com/product/12824/ Intel PRO 10/100 Adapters (UnixWare/SCO6) 4.x http://secunia.com/product/12827/ Intel PRO 10/100 Adapters (Windows) 8.x http://secunia.com/product/12821/ Intel PRO/1000 Adapters (Linux) 7.x http://secunia.com/product/12825/ Intel PRO/1000 Adapters (UnixWare/SCO6) 9.x http://secunia.com/product/12828/ Intel PRO/1000 Adapters (Windows) 8.x http://secunia.com/product/12822/ Intel PRO/1000 PCIe Adapters (Windows) 9.x http://secunia.com/product/12823/ Intel PRO/10GbE Adapters (Linux) 1.x http://secunia.com/product/12826/ DESCRIPTION: A vulnerability has been reported in Intel LAN drivers, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to an unspecified error and can be exploited to cause a buffer overflow by using certain function calls incorrectly. SOLUTION: Apply patches (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: The vendor credits eEye Digital Security. ORIGINAL ADVISORY: Intel: http://www.intel.com/support/network/sb/CS-023726.htm ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2006-6385 // CERT/CC: VU#296681 // JVNDB: JVNDB-2006-000813 // BID: 21456 // VULHUB: VHN-22493 // PACKETSTORM: 52799

AFFECTED PRODUCTS

vendor:intelmodel:pro 10gbe adaptersscope:lteversion:1.0.109

Trust: 1.0

vendor:intelmodel:pro 10 100 adaptersscope:lteversion:8.0.27.0

Trust: 1.0

vendor:intelmodel:pro 10 100 adaptersscope:lteversion:4.0.3

Trust: 1.0

vendor:intelmodel:pro 1000 adaptersscope:lteversion:7.2.7

Trust: 1.0

vendor:intelmodel:pro 1000 adaptersscope:lteversion:8.7.1.0

Trust: 1.0

vendor:intelmodel:pro 1000 adaptersscope:lteversion:9.0.15

Trust: 1.0

vendor:intelmodel:pro 1000 pcie adaptersscope:lteversion:9.1.30.0

Trust: 1.0

vendor:intelmodel:pro 10 100 adaptersscope:lteversion:3.5.14

Trust: 1.0

vendor:hitachimodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel:pcie pro/1000scope:lteversion:9.0.15.0 from 9.1.34.0

Trust: 0.8

vendor:intelmodel:pro 10/100scope:lteversion:4.2.38.1 from 8.0.27.0

Trust: 0.8

vendor:intelmodel:pro/1000scope:lteversion:6.2.21.0 from 8.7.1.0

Trust: 0.8

vendor:sonymodel:vaioscope:eqversion:( see the vendor information for type names. )

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:220w(np3/np4/np7/np9)

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:270gx(nw1/nw2/nw3)

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:270hx(nw5)

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:270w(nw6/nw7)

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:330w(dg5/dg8)

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:350w(de3/de4/de5/de7/de8/de9)

Trust: 0.8

vendor:hitachimodel:florascope:eqversion:bd100 a1/a3/b2/b3

Trust: 0.8

vendor:hitachimodel:ha8000 seriesscope: - version: -

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:k series: pcf-ar37k

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:pcf-ar35k

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:pcf-ar340

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:l series: pcf-ar37l

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:pcf-ar35l

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:m series: pcf-ar37m

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:pcf-ar35m

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:pcf-ar33m

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:n series: pcf-ar35n

Trust: 0.8

vendor:hitachimodel:prius airscope:eqversion:pcf-ar33n

Trust: 0.8

vendor:hitachimodel:prius airnotescope:eqversion:k series: pcf-an37kt

Trust: 0.8

vendor:hitachimodel:prius airnotescope:eqversion:l series: pcf-an37lt

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:l series: pcf-ds75l

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:pcf-ds73l

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:m series: pcf-ds75m

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:pcf-ds73m

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:n series: pcf-dh75n

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:pcf-dh73n

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:p series: pcf-dh75p2

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:pcf-dh73p2

Trust: 0.8

vendor:hitachimodel:prius deckscope:eqversion:pcf-dh74p2w

Trust: 0.8

vendor:fujitsumodel:celsius work stationscope:eqversion:( see the vendor information for type names. )

Trust: 0.8

vendor:fujitsumodel:fmv desktopscope:eqversion:series ( see the vendor information for type names. )

Trust: 0.8

vendor:fujitsumodel:fmv fa computerscope:eqversion:( see the vendor information for type names. )

Trust: 0.8

vendor:fujitsumodel:fmv-deskpowerscope:eqversion:series ( see the vendor information for type names. )

Trust: 0.8

vendor:fujitsumodel:fmv-esprimoscope:eqversion:series ( see the vendor information for type names. )

Trust: 0.8

vendor:fujitsumodel:fmv-lifebookscope:eqversion:series ( see the vendor information for type names. )

Trust: 0.8

vendor:fujitsumodel:option cardscope:eqversion:(fmv lan driver - refer to vendor information for details. )

Trust: 0.8

vendor:intelmodel:pro/1000scope:neversion:8.7.9.0

Trust: 0.6

vendor:intelmodel:pro 1000 adaptersscope:eqversion:7.2.7

Trust: 0.6

vendor:intelmodel:pro 10gbe adaptersscope:eqversion:1.0.109

Trust: 0.6

vendor:intelmodel:pro 1000 pcie adaptersscope:eqversion:9.1.30.0

Trust: 0.6

vendor:intelmodel:pro 1000 adaptersscope:eqversion:9.0.15

Trust: 0.6

vendor:intelmodel:pro 1000 adaptersscope:eqversion:8.7.1.0

Trust: 0.6

vendor:intelmodel:pro 10 100 adaptersscope:eqversion:3.5.14

Trust: 0.6

vendor:intelmodel:pro 10 100 adaptersscope:eqversion:4.0.3

Trust: 0.6

vendor:intelmodel:pro 10 100 adaptersscope:eqversion:8.0.27.0

Trust: 0.6

vendor:intelmodel:pro/10gbescope:eqversion:1.0.109

Trust: 0.3

vendor:intelmodel:pro/1000 pciescope:eqversion:9.1.30.0

Trust: 0.3

vendor:intelmodel:pro/1000scope:eqversion:0

Trust: 0.3

vendor:intelmodel:pro/1000scope:eqversion:9.0.15

Trust: 0.3

vendor:intelmodel:pro/1000scope:eqversion:7.2.7

Trust: 0.3

vendor:intelmodel:pro/1000scope:eqversion:8.7.1.0

Trust: 0.3

vendor:intelmodel:proscope:eqversion:10/1004.0.3

Trust: 0.3

vendor:intelmodel:proscope:eqversion:10/1003.5.14

Trust: 0.3

vendor:intelmodel:proscope:eqversion:10/1008.0.27.0

Trust: 0.3

vendor:intelmodel:pro/10gbescope:neversion:1.0.119

Trust: 0.3

vendor:intelmodel:pro/1000 pciescope:neversion:9.6.31

Trust: 0.3

vendor:intelmodel:pro/1000scope:neversion:7.2.17

Trust: 0.3

vendor:intelmodel:pro/1000scope:neversion:9.2.6

Trust: 0.3

vendor:intelmodel:pro/1000scope:neversion:7.3.15

Trust: 0.3

vendor:intelmodel:proscope:neversion:10/1004.0.4

Trust: 0.3

vendor:intelmodel:proscope:neversion:10/1003.5.17

Trust: 0.3

vendor:intelmodel:proscope:neversion:10/1008.0.43.0

Trust: 0.3

sources: CERT/CC: VU#296681 // BID: 21456 // JVNDB: JVNDB-2006-000813 // CNNVD: CNNVD-200612-151 // NVD: CVE-2006-6385

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6385
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#296681
value: 1.06

Trust: 0.8

NVD: CVE-2006-6385
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200612-151
value: HIGH

Trust: 0.6

VULHUB: VHN-22493
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-6385
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-22493
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#296681 // VULHUB: VHN-22493 // JVNDB: JVNDB-2006-000813 // CNNVD: CNNVD-200612-151 // NVD: CVE-2006-6385

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6385

THREAT TYPE

local

Trust: 1.0

sources: BID: 21456 // PACKETSTORM: 52799 // CNNVD: CNNVD-200612-151

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200612-151

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000813

PATCH

title:Network Connectivity - Intel LAN Driver Buffer Overflow Local Privilege Escalationurl:http://www.intel.com/support/network/sb/CS-023726.htm

Trust: 0.8

title:Network Connectivity - How to Determine the Driver Version for an Intel Network Adapterurl:http://support.intel.com/support/network/sb/CS-023453.htm

Trust: 0.8

title:INTEL-SA-00006url:http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00006&languageid=en-fr

Trust: 0.8

title:サポートページurl:http://vcl.vaio.sony.co.jp/

Trust: 0.8

title:「Ethernet Driver Ver.8.0.43.0」アップデートプログラムurl:http://vcl.vaio.sony.co.jp/download/SP-015317-00.html

Trust: 0.8

title:「Ethernet Driver Ver.8.7.9.0」アップデートプログラムurl:http://vcl.vaio.sony.co.jp/download/SP-015318-00.html

Trust: 0.8

title:「Ethernet Driver Ver.9.6.31.0」アップデートプログラムurl:http://vcl.vaio.sony.co.jp/download/SP-015318-01.html

Trust: 0.8

title:インテルR LAN ドライバー : バッファー・オーバーフローによるローカル権限の昇格url:http://www.intel.com/jp/support/network/sb/CS-023726.htm

Trust: 0.8

title:【重要】Inetl社製LANドライバの脆弱性に関するお知らせurl:http://www.hitachi.co.jp/Prod/comp/OSD/pc/ha/information/info070104.html

Trust: 0.8

title:【重要】 Intel社製LANドライバの脆弱性に関するお知らせurl:http://www.hitachi.co.jp/Prod/comp/OSD/pc/flora/information/info0701051.html

Trust: 0.8

title:Intel社製LANドライバの脆弱性に関してurl:http://prius.jeevessolutions.jp/je/faq.asp?fid=104034

Trust: 0.8

title:[緊急] Intel社製LANドライバの脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/intel/lan-driver/

Trust: 0.8

title:VU#296681url:http://software.fujitsu.com/jp/security/vulnerabilities/vu296681.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000813

EXTERNAL IDS

db:SECUNIAid:23221

Trust: 3.4

db:CERT/CCid:VU#296681

Trust: 3.3

db:BIDid:21456

Trust: 2.8

db:NVDid:CVE-2006-6385

Trust: 2.8

db:SECTRACKid:1017346

Trust: 2.5

db:SREASONid:2007

Trust: 1.7

db:VUPENid:ADV-2006-4871

Trust: 1.7

db:XFid:30750

Trust: 1.4

db:JVNDBid:JVNDB-2006-000813

Trust: 0.8

db:CNNVDid:CNNVD-200612-151

Trust: 0.7

db:MLISTid:[FREEBSD-SECURITY] 20061206 INTEL LAN DRIVER BUFFER OVERFLOW LOCAL PRIVILEGE ESCALATION

Trust: 0.6

db:BUGTRAQid:20061207 EEYE: INTEL NETWORK ADAPTER DRIVER LOCAL PRIVILEGE ESCALATION

Trust: 0.6

db:VULHUBid:VHN-22493

Trust: 0.1

db:PACKETSTORMid:52799

Trust: 0.1

sources: CERT/CC: VU#296681 // VULHUB: VHN-22493 // BID: 21456 // JVNDB: JVNDB-2006-000813 // PACKETSTORM: 52799 // CNNVD: CNNVD-200612-151 // NVD: CVE-2006-6385

REFERENCES

url:http://www.intel.com/support/network/sb/cs-023726.htm

Trust: 2.9

url:http://research.eeye.com/html/advisories/published/ad20061207.html

Trust: 2.5

url:http://research.eeye.com/html/advisories/upcoming/20060710.html

Trust: 2.5

url:http://www.securityfocus.com/bid/21456

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/296681

Trust: 2.5

url:http://securitytracker.com/id?1017346

Trust: 2.5

url:http://secunia.com/advisories/23221

Trust: 2.5

url:http://lists.freebsd.org/pipermail/freebsd-security/2006-december/004186.html

Trust: 1.7

url:http://securityreason.com/securityalert/2007

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/30750

Trust: 1.4

url:http://www.securityfocus.com/archive/1/453852/100/0/threaded

Trust: 1.1

url:http://www.fujitsu.com/global/support/software/security/products-f/primergy-200701e.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4871

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30750

Trust: 1.1

url:http://secunia.com/advisories/23221/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6385

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23296681/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-6385

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4871

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/453852/100/0/threaded

Trust: 0.6

url:http://support.intel.com/support/network/sb/cs-006120.htm

Trust: 0.3

url:http://support.intel.com/support/network/sb/cs-006103.htm

Trust: 0.3

url:http://support.intel.com/support/network/adapter/pro100/sb/cs-008402.htm

Trust: 0.3

url:http://www-307.ibm.com/pc/support/site.wss/document.do?lndocid=migr-67116

Trust: 0.3

url:/archive/1/453852

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/12822/

Trust: 0.1

url:http://secunia.com/product/12821/

Trust: 0.1

url:http://secunia.com/product/12825/

Trust: 0.1

url:http://secunia.com/product/12828/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/product/12826/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/12827/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/product/12824/

Trust: 0.1

url:http://secunia.com/product/12823/

Trust: 0.1

sources: CERT/CC: VU#296681 // VULHUB: VHN-22493 // BID: 21456 // JVNDB: JVNDB-2006-000813 // PACKETSTORM: 52799 // CNNVD: CNNVD-200612-151 // NVD: CVE-2006-6385

CREDITS

Derek Soeder dsoeder@eeye.com

Trust: 0.6

sources: CNNVD: CNNVD-200612-151

SOURCES

db:CERT/CCid:VU#296681
db:VULHUBid:VHN-22493
db:BIDid:21456
db:JVNDBid:JVNDB-2006-000813
db:PACKETSTORMid:52799
db:CNNVDid:CNNVD-200612-151
db:NVDid:CVE-2006-6385

LAST UPDATE DATE

2024-08-14T14:08:19.231000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#296681date:2007-01-19T00:00:00
db:VULHUBid:VHN-22493date:2018-10-17T00:00:00
db:BIDid:21456date:2008-05-06T22:45:00
db:JVNDBid:JVNDB-2006-000813date:2007-06-15T00:00:00
db:CNNVDid:CNNVD-200612-151date:2006-12-11T00:00:00
db:NVDid:CVE-2006-6385date:2018-10-17T21:48:00.017

SOURCES RELEASE DATE

db:CERT/CCid:VU#296681date:2006-12-18T00:00:00
db:VULHUBid:VHN-22493date:2006-12-08T00:00:00
db:BIDid:21456date:2006-12-06T00:00:00
db:JVNDBid:JVNDB-2006-000813date:2007-04-01T00:00:00
db:PACKETSTORMid:52799date:2006-12-07T06:24:29
db:CNNVDid:CNNVD-200612-151date:2006-12-07T00:00:00
db:NVDid:CVE-2006-6385date:2006-12-08T01:28:00