Executive Summary
Summary | |
---|---|
Title | Linux kernel perf_swevent_enabled array out-of-bound access privilege escalation vulnerability |
Informations | |||
---|---|---|---|
Name | VU#774103 | First vendor Publication | 2013-05-17 |
Vendor | VU-CERT | Last vendor Modification | 2013-05-17 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#774103Linux kernel perf_swevent_enabled array out-of-bound access privilege escalation vulnerabilityOverviewThe Linux kernel's Performance Events implementation is susceptible to an out-of-bounds array vulnerability that may be used by a local unprivileged user to escalate privileges. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditTommi Rantala discovered this vulnerability. This document was written by Jared Allar. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/774103 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17404 | |||
Oval ID: | oval:org.mitre.oval:def:17404 | ||
Title: | USN-1828-1 -- linux-lts-quantal vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1828-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18242 | |||
Oval ID: | oval:org.mitre.oval:def:18242 | ||
Title: | USN-1826-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1826-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18266 | |||
Oval ID: | oval:org.mitre.oval:def:18266 | ||
Title: | USN-1827-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1827-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18310 | |||
Oval ID: | oval:org.mitre.oval:def:18310 | ||
Title: | USN-1825-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1825-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27667 | |||
Oval ID: | oval:org.mitre.oval:def:27667 | ||
Title: | DEPRECATED: ELSA-2013-0830 -- kernel security update (important) | ||
Description: | [2.6.32-358.6.2] - [kernel] perf: fix perf_swevent_enabled array out-of-bound access (Petr Matousek) [962793 962794] {CVE-2013-2094} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0830 CVE-2013-2094 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2013-06-11 | Linux kernel perf_swevent_init - Local root Exploit |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0832.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14445.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0829.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-512.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-454.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-452.nasl - Type : ACT_GATHER_INFO |
2014-03-20 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-190.nasl - Type : ACT_GATHER_INFO |
2013-09-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2546.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2524.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2525.nasl - Type : ACT_GATHER_INFO |
2013-06-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-176.nasl - Type : ACT_GATHER_INFO |
2013-05-31 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1849-1.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-140-01.nasl - Type : ACT_GATHER_INFO |
2013-05-22 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130515.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0841.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0840.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130516_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2669.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1827-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1828-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1826-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1825-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-03-21 13:21:30 |
|
2013-05-30 13:26:44 |
|
2013-05-17 21:18:16 |
|