[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-2406

Date: (C)2009-07-31   (M)2017-09-22
 
CVSS Score: 6.9Access Vector: LOCAL
Exploitability Subscore: 3.4Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.

Reference:
SECTRACK-1022663
http://www.securityfocus.com/archive/1/archive/1/505334/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
BID-35851
SECUNIA-35985
SECUNIA-36045
SECUNIA-36051
SECUNIA-36054
SECUNIA-36116
SECUNIA-36131
SECUNIA-37471
ADV-2009-2041
ADV-2009-3316
DSA-1844
DSA-1845
FEDORA-2009-8144
FEDORA-2009-8264
MDVSA-2011:029
RHSA-2009:1193
SUSE-SR:2009:015
USN-807-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6352a29305373ae6196491e6d4669f301e26492e
http://risesecurity.org/advisories/RISE-2009002.txt
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4
http://www.vmware.com/security/advisories/VMSA-2009-0016.html

CPE    377
cpe:/o:linux:linux_kernel:2.6.24:rc3
cpe:/o:linux:linux_kernel:2.6.24:rc2
cpe:/o:linux:linux_kernel:2.6.27.6
cpe:/o:linux:linux_kernel:2.6.27.5
...
CWE    1
CWE-119
OVAL    20
oval:org.secpod.oval:def:400084
oval:org.mitre.oval:def:8024
oval:org.secpod.oval:def:102012
oval:org.secpod.oval:def:700435
...

© 2013 SecPod Technologies