[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-2148Date: (C)2008-05-12   (M)2023-12-22


The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 3.6
Exploit Score: 3.9
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-29134
SECUNIA-30198
SECUNIA-30241
SECUNIA-30818
SECUNIA-31107
SECUNIA-31628
ADV-2008-1543
MDVSA-2008:167
RHSA-2008:0585
SUSE-SA:2008:030
USN-625-1
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f9dfda1ad0637a89a64d001cf81478bd8d9b6306
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169
linux-kernel-sysutimensat-dos(42342)

CPE    22
cpe:/o:linux:linux_kernel:2.6.22
cpe:/o:linux:linux_kernel:2.6.22.2
cpe:/o:linux:linux_kernel:2.6.22.3
cpe:/o:linux:linux_kernel:2.6.22.4
...
CWE    1
CWE-264
OVAL    1
oval:org.secpod.oval:def:301293

© SecPod Technologies