[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-1593Date: (C)2015-04-07   (M)2024-03-26


The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-72607
DSA-3170
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1221
RHSA-2019:3517
SUSE-SU-2015:0736
USN-2560-1
USN-2561-1
USN-2562-1
USN-2563-1
USN-2564-1
USN-2565-1
https://lkml.org/lkml/2015/1/7/811
http://www.openwall.com/lists/oss-security/2015/02/13/13
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
http://hmarco.org/bugs/linux-ASLR-integer-overflow.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
https://bugzilla.redhat.com/show_bug.cgi?id=1192519
https://github.com/torvalds/linux/commit/4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
openSUSE-SU-2015:0714

CWE    1
CWE-264
OVAL    40
oval:org.secpod.oval:def:1501070
oval:org.secpod.oval:def:1504160
oval:org.secpod.oval:def:52451
oval:org.secpod.oval:def:1501052
...

© SecPod Technologies