Lucene search

K
saintSAINT CorporationSAINT:8BE23F1EC35A570A9A83983E4E020927
HistoryDec 03, 2014 - 12:00 a.m.

Linux kernel futex_requeue privilege elevation

2014-12-0300:00:00
SAINT Corporation
download.saintcorporation.com
43

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.1%

Added: 12/03/2014
CVE: CVE-2014-3153
BID: 67906
OSVDB: 107752

Background

The futex system call in Linux provides a mechanism for user-space locking.

Problem

A vulnerability in the Linux kernel allows an unprivileged user to gain root access using a specially crafted **futex_requeue** call.

Resolution

Upgrade to a fixed kernel package from your Linux vendor.

References

<https://lists.debian.org/debian-security-announce/2014/msg00130.html&gt;

Limitations

Exploit works on CentOS 7 and Red Hat 7 and requires an existing unprivileged shell connection to the target.

Platforms

Linux

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.1%