[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-1897Date: (C)2009-07-20   (M)2024-02-22


The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and 2.6.30.1, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.9
Exploit Score: 3.4
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0241.html
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0246.html
SECUNIA-35839
ADV-2009-1925
http://lkml.org/lkml/2009/7/6/19
http://article.gmane.org/gmane.linux.network/124939
http://www.openwall.com/lists/oss-security/2009/07/17/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c8a9c63d5fd738c261bd0ceece04d9c8357ca13
http://grsecurity.net/~spender/cheddar_bay.tgz
http://isc.sans.org/diary.html?storyid=6820
https://bugzilla.redhat.com/show_bug.cgi?id=512284
https://www.redhat.com/en/blog/security-flaws-caused-compiler-optimizations
linux-kernel-tunchrpoll-code-execution(51803)

CWE    1
CWE-119
OVAL    10
oval:org.secpod.oval:def:101648
oval:org.secpod.oval:def:101657
oval:org.secpod.oval:def:102347
oval:org.secpod.oval:def:102304
...

© SecPod Technologies