2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
5.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.1%
The remote host is missing a security patch.
# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/h:f5:big-ip";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.105439");
script_cve_id("CVE-2014-9419");
script_tag(name:"cvss_base", value:"2.1");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:N/A:N");
script_version("2024-05-29T05:05:18+0000");
script_name("F5 BIG-IP - Linux kernel vulnerability CVE-2014-9419");
script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K17551");
script_tag(name:"impact", value:"A local authenticated attacker may obtain sensitive information from kernel memory by using a specially crafted application.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address. (CVE-2014-9419)");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_tag(name:"summary", value:"The remote host is missing a security patch.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"last_modification", value:"2024-05-29 05:05:18 +0000 (Wed, 29 May 2024)");
script_tag(name:"creation_date", value:"2015-11-09 10:38:23 +0100 (Mon, 09 Nov 2015)");
script_category(ACT_GATHER_INFO);
script_family("F5 Local Security Checks");
script_copyright("Copyright (C) 2015 Greenbone AG");
script_dependencies("gb_f5_big_ip_ssh_login_detect.nasl");
script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");
exit(0);
}
include("f5.inc");
include("host_details.inc");
include("list_array_func.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE, service: "ssh-login"))
exit(0);
check_f5["LTM"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["AAM"] = make_array("affected", "11.4.0-11.6.0;",
"unaffected", "12.0.0;");
check_f5["AFM"] = make_array("affected", "11.3.0-11.6.0;",
"unaffected", "12.0.0;");
check_f5["AVR"] = make_array("affected", "11.0.0-11.6.0;",
"unaffected", "12.0.0;");
check_f5["APM"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["ASM"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["LC"] = make_array("affected", "11.0.0-11.6.0;10.1.0-10.2.4;",
"unaffected", "12.0.0;");
check_f5["PEM"] = make_array("affected", "11.3.0-11.6.0;",
"unaffected", "12.0.0;");
if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
security_message(port: 0, data: report);
exit(0);
}
exit(99);