Lucene search

K
cve[email protected]CVE-2009-0834
HistoryMar 06, 2009 - 11:30 a.m.

CVE-2009-0834

2009-03-0611:30:02
web.nvd.nist.gov
64
cve-2009-0834
linux kernel
syscall
vulnerability
nvd
x86_64
cve-2009-0342
cve-2009-0343

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

4.6 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

19.1%

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.28.7
Node
debiandebian_linuxMatch4.0
OR
debiandebian_linuxMatch5.0
Node
canonicalubuntu_linuxMatch7.10
OR
canonicalubuntu_linuxMatch8.04-
OR
canonicalubuntu_linuxMatch8.10
Node
redhatenterprise_linux_desktopMatch4.0
OR
redhatenterprise_linux_desktopMatch5.0
OR
redhatenterprise_linux_eusMatch4.7
OR
redhatenterprise_linux_eusMatch5.3
OR
redhatenterprise_linux_serverMatch4.0
OR
redhatenterprise_linux_serverMatch5.0
OR
redhatenterprise_linux_server_ausMatch5.3
OR
redhatenterprise_linux_workstationMatch4.0
OR
redhatenterprise_linux_workstationMatch5.0
Node
opensuseopensuseMatch10.3
OR
opensuseopensuseMatch11.0
OR
suselinux_enterprise_desktopMatch10sp2
OR
suselinux_enterprise_serverMatch10sp2
OR
suselinux_enterprise_software_development_kitMatch10sp2

References

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

4.6 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

19.1%