CVE-2006-2916

7.8 HIGH
Published: June 15, 2006 Modified: April 16, 2026
View on NVD

Description

artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://dot.kde.org/1150310128/
Source: cve@mitre.org
Not Applicable
http://secunia.com/advisories/20677
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/20786
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/20827
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/20868
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/20899
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/25032
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/25059
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200704-22.xml
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1016298
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml
Source: cve@mitre.org
Third Party Advisory
http://www.kde.org/info/security/advisory-20060614-2.txt
Source: cve@mitre.org
Patch Vendor Advisory
http://www.osvdb.org/26506
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/archive/1/437362/100/0/threaded
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/18429
Source: cve@mitre.org
Broken Link Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23697
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/2357
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2007/0409
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/27221
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://dot.kde.org/1150310128/
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://mail.gnome.org/archives/beast/2006-December/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/20677
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/20786
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/20827
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/20868
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/20899
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/25032
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25059
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200704-22.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1016298
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kde.org/info/security/advisory-20060614-2.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:107
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.novell.com/linux/security/advisories/2006_38_security.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/26506
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/437362/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/18429
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23697
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/2357
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2007/0409
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/27221
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.1%
35th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

kde linux