Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 157529 - Intel LAN Driver Buffer Overflow Local Privilege Escalation
Summary: Intel LAN Driver Buffer Overflow Local Privilege Escalation
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal
Assignee: Gentoo Security
URL: http://www.intel.com/support/network/...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-12-08 11:53 UTC by Peter Volkov (RETIRED)
Modified: 2020-02-06 09:05 UTC (History)
7 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Peter Volkov (RETIRED) gentoo-dev 2006-12-08 11:53:01 UTC
Seems that all kernels and net-misc/e100 are affected. There were reports (from guys in altlinux) that this problem could hardly be exploitable but in any case better to double check, fix and be safe. :)

Summary from the URL:

Title: Intel
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2006-12-08 11:53:01 UTC
Seems that all kernels and net-misc/e100 are affected. There were reports (from guys in altlinux) that this problem could hardly be exploitable but in any case better to double check, fix and be safe. :)

Summary from the URL:

Title: Intel® LAN Driver Buffer Overflow Local Privilege Escalation
Intel ID: INTEL-sa-00004
Product family: Intel® Network Protocol Drivers for Intel® Network Adapters
Impact of vulnerability: Elevation of Privilege
Severity rating: Important
Original release: Dec 5, 2006

Details

Summary:
A vulnerability exists in all PCI, PCI-X and PCIe Intel network adapter drivers that could allow unprivileged code executing on an affected system to perform a local privilege escalation.

Description:
This vulnerability is due to a buffer overflow that could be caused by incorrect use of a function call. This condition could allow unauthorized code to be introduced that could be run with kernel-level privileges.

Affected products:

Product Family 	OS
Intel PRO 10/100 Adapters  Affected: <3.5.14   Corrected: >=3.5.17
Intel PRO/1000   Adapters  Affected: <7.2.7    Corrected: >=7.3.15
Intel PRO/10GbE  Adapters  Affected: <1.0.109  Corrected: >=1.0.119
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-12-08 23:36:19 UTC
According to upstream this is only "exploitable" by root on Linux. Upstream site should be updated shortly. I think we can close this one.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-12-14 22:53:59 UTC
Upstream page updated to reflect that only Windows is affected.
Comment 4 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-12-15 02:42:13 UTC
(In reply to comment #2)
> Upstream page updated to reflect that only Windows is affected.
> 

http://research.eeye.com/html/advisories/published/AD20061207.html agrees.

Closing as invalid, then. Feel free to reopen if there is another news or if you disagree.