CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.4%
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
suse | linux_enterprise_real_time | 10 | cpe:2.3:o:suse:linux_enterprise_real_time:10:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 4.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 5.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 4.8 | cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 5.3 | cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 4.0 | cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 5.0 | cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server_aus | 5.3 | cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html
blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html
git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=c18d0fe535a73b219f960d1af3d0c264555a12e3
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e694958388c50148389b0e9b9e9e8945cf0f1b98
grsecurity.net/~spender/wunderbar_emporium.tgz
lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
rhn.redhat.com/errata/RHSA-2009-1222.html
rhn.redhat.com/errata/RHSA-2009-1223.html
secunia.com/advisories/36278
secunia.com/advisories/36289
secunia.com/advisories/36327
secunia.com/advisories/36430
secunia.com/advisories/37298
secunia.com/advisories/37471
support.avaya.com/css/P8/documents/100067254
wiki.rpath.com/wiki/Advisories:rPSA-2009-0121
www.debian.org/security/2009/dsa-1865
www.exploit-db.com/exploits/19933
www.exploit-db.com/exploits/9477
www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.5
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5
www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
www.mandriva.com/security/advisories?name=MDVSA-2009:233
www.openwall.com/lists/oss-security/2009/08/14/1
www.redhat.com/support/errata/RHSA-2009-1233.html
www.securityfocus.com/archive/1/505751/100/0/threaded
www.securityfocus.com/archive/1/505912/100/0/threaded
www.securityfocus.com/archive/1/507985/100/0/threaded
www.securityfocus.com/archive/1/512019/100/0/threaded
www.securityfocus.com/bid/36038
www.vmware.com/security/advisories/VMSA-2009-0016.html
www.vupen.com/english/advisories/2009/2272
www.vupen.com/english/advisories/2009/3316
zenthought.org/content/file/android-root-2009-08-16-source
bugzilla.redhat.com/show_bug.cgi?id=516949
issues.rpath.com/browse/RPL-3103
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11526
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11591
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8657
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.4%