[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2013-0268

Date: (C)2013-02-18   (M)2016-07-22
 
CVSS Score: 6.2Access Vector: LOCAL
Exploitability Subscore: 1.9Access Complexity: HIGH
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.

Reference:
SUSE-SU-2013:0674
http://www.openwall.com/lists/oss-security/2013/02/07/12
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c903f0456bc69176912dee6dd25c6a66ee1aed00
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.6
https://bugzilla.redhat.com/show_bug.cgi?id=908693
https://github.com/torvalds/linux/commit/c903f0456bc69176912dee6dd25c6a66ee1aed00
openSUSE-SU-2013:1187

CPE    167
cpe:/o:linux:linux_kernel:3.0.40
cpe:/o:linux:linux_kernel:3.0.42
cpe:/o:linux:linux_kernel:3.0.41
cpe:/o:linux:linux_kernel:3.0.44
...
CWE    1
CWE-264
OVAL    28
oval:org.secpod.oval:def:104633
oval:org.secpod.oval:def:202637
oval:org.secpod.oval:def:501022
oval:org.secpod.oval:def:701232
...

© 2013 SecPod Technologies