CVE-2008-0007

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.

References

http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html

http://lists.vmware.com/pipermail/security-announce/2008/000023.html

http://lkml.org/lkml/2008/2/6/457

http://secunia.com/advisories/28806

http://secunia.com/advisories/28826

http://secunia.com/advisories/29058

http://secunia.com/advisories/29570

http://secunia.com/advisories/30018

http://secunia.com/advisories/30110

http://secunia.com/advisories/30112

http://secunia.com/advisories/30116

http://secunia.com/advisories/30769

http://secunia.com/advisories/31246

http://secunia.com/advisories/33280

http://securitytracker.com/id?1019357

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048

http://www.debian.org/security/2008/dsa-1503

http://www.debian.org/security/2008/dsa-1504

http://www.debian.org/security/2008/dsa-1565

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1

http://www.mandriva.com/security/advisories?name=MDVSA-2008:044

http://www.mandriva.com/security/advisories?name=MDVSA-2008:072

http://www.mandriva.com/security/advisories?name=MDVSA-2008:112

http://www.mandriva.com/security/advisories?name=MDVSA-2008:174

http://www.redhat.com/support/errata/RHSA-2008-0211.html

http://www.redhat.com/support/errata/RHSA-2008-0233.html

http://www.redhat.com/support/errata/RHSA-2008-0237.html

http://www.redhat.com/support/errata/RHSA-2008-0787.html

http://www.securityfocus.com/archive/1/487808/100/0/threaded

http://www.securityfocus.com/bid/27686

http://www.securityfocus.com/bid/27705

http://www.ubuntu.com/usn/usn-618-1

http://www.vupen.com/english/advisories/2008/0445/references

http://www.vupen.com/english/advisories/2008/2222/references

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412

Details

Source: MITRE

Published: 2008-02-08

Updated: 2018-10-15

Type: CWE-399

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 2.6.22.16 (inclusive)

Tenable Plugins

View all (28 total)

IDNameProductFamilySeverity
67685Oracle Linux 4 : kernel (ELSA-2008-0237)NessusOracle Linux Local Security Checks
high
67683Oracle Linux 5 : kernel (ELSA-2008-0233)NessusOracle Linux Local Security Checks
high
67678Oracle Linux 3 : kernel (ELSA-2008-0211)NessusOracle Linux Local Security Checks
high
60395Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
60394Scientific Linux Security Update : kernel on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
high
60393Scientific Linux Security Update : kernel on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
high
59126SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 4938)NessusSuSE Local Security Checks
high
43682CentOS 4 : kernel (CESA-2008:0237)NessusCentOS Local Security Checks
high
43681CentOS 5 : kernel (CESA-2008:0233)NessusCentOS Local Security Checks
high
40380VMSA-2008-0011 : Updated ESX service console packages for Samba and vmnixNessusVMware ESX Local Security Checks
high
36924Mandriva Linux Security Advisory : kernel (MDVSA-2008:044)NessusMandriva Local Security Checks
high
36852Mandriva Linux Security Advisory : kernel (MDVSA-2008:112)NessusMandriva Local Security Checks
high
35323RHEL 2.1 : kernel (RHSA-2009:0001)NessusRed Hat Local Security Checks
high
33255Ubuntu 6.06 LTS / 7.04 / 7.10 : linux-source-2.6.15/20/22 vulnerabilities (USN-618-1)NessusUbuntu Local Security Checks
high
32162RHEL 4 : kernel (RHSA-2008:0237)NessusRed Hat Local Security Checks
high
32161RHEL 5 : kernel (RHSA-2008:0233)NessusRed Hat Local Security Checks
high
32160RHEL 3 : kernel (RHSA-2008:0211)NessusRed Hat Local Security Checks
high
32139CentOS 3 : kernel (CESA-2008:0211)NessusCentOS Local Security Checks
high
32127Debian DSA-1565-1 : linux-2.6 - several vulnerabilitiesNessusDebian Local Security Checks
high
31148Debian DSA-1504-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
high
31147Debian DSA-1503-1 : kernel-source-2.4.27 - several vulnerabilitiesNessusDebian Local Security Checks
high
30250openSUSE 10 Security Update : kernel (kernel-4970)NessusSuSE Local Security Checks
high
30249SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 4935)NessusSuSE Local Security Checks
high
30144openSUSE 10 Security Update : kernel (kernel-4943)NessusSuSE Local Security Checks
high
30143openSUSE 10 Security Update : kernel (kernel-4941)NessusSuSE Local Security Checks
high
30142openSUSE 10 Security Update : kernel (kernel-4929)NessusSuSE Local Security Checks
high
801451CentOS RHSA-2008-0237 Security CheckLog Correlation EngineGeneric
high
801450CentOS RHSA-2008-0233 Security CheckLog Correlation EngineGeneric
high