openSUSE Security Update : libudev-devel (libudev-devel-768)

high Nessus Plugin ID 40050

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes a local privilege escalation in udev.

CVE-2009-1185: udev did not check the origin of the netlink messages.
A local attacker could fake device create events and so gain root privileges.

Solution

Update the affected libudev-devel packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=493158

Plugin Details

Severity: High

ID: 40050

File Name: suse_11_0_libudev-devel-090414.nasl

Version: 1.16

Type: local

Agent: unix

Published: 7/21/2009

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libvolume_id, p-cpe:/a:novell:opensuse:libvolume_id-devel, p-cpe:/a:novell:opensuse:udev, cpe:/o:novell:opensuse:11.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/14/2009

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Linux udev Netlink Local Privilege Escalation)

Reference Information

CVE: CVE-2009-1185

CWE: 20