[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2014-3917Date: (C)2014-06-16   (M)2018-02-19


kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : CVSS Score  : 3.3
Exploit Score: Exploit Score: 3.4
Impact Score : Impact Score : 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: LOCAL
Attack Complexity: Access Complexity: MEDIUM
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: NONE
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  





Reference:
SECUNIA-59777
SECUNIA-60011
SECUNIA-60564
RHSA-2014:1143
RHSA-2014:1281
SUSE-SU-2015:0812
USN-2334-1
USN-2335-1
http://article.gmane.org/gmane.linux.kernel/1713179
http://www.openwall.com/lists/oss-security/2014/05/29/5
https://bugzilla.redhat.com/show_bug.cgi?id=1102571

CPE    17
cpe:/a:redhat:enterprise_mrg:2.0
cpe:/o:linux:linux_kernel:3.14:rc8
cpe:/o:linux:linux_kernel:3.14:rc7
cpe:/o:linux:linux_kernel:3.14:rc6
...
CWE    1
CWE-200
OVAL    58
oval:org.secpod.oval:def:203408
oval:org.secpod.oval:def:203426
oval:org.secpod.oval:def:203419
oval:org.secpod.oval:def:1500716
...
XCCDF    1
CWE-200

© 2013 SecPod Technologies