[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-3833Date: (C)2008-10-03   (M)2024-02-22


The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.9
Exploit Score: 3.9
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: NONE
Availability: NONE
  
Reference:
BID-31567
SECUNIA-32237
SECUNIA-32485
SECUNIA-32759
DSA-1653
RHSA-2008:0957
SUSE-SR:2008:025
http://openwall.com/lists/oss-security/2008/10/03/1
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3
https://bugzilla.redhat.com/show_bug.cgi?id=464450
kernel-genericfilesplice-priv-escalation(45922)
oval:org.mitre.oval:def:9980

CWE    1
CWE-264
OVAL    1
oval:org.mitre.oval:def:7921

© SecPod Technologies