CVE-2008-0600

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

References

http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html

http://marc.info/?l=linux-kernel&m=120263652322197&w=2

http://marc.info/?l=linux-kernel&m=120264520431307&w=2

http://marc.info/?l=linux-kernel&m=120264773202422&w=2

http://marc.info/?l=linux-kernel&m=120266328220808&w=2

http://marc.info/?l=linux-kernel&m=120266353621139&w=2

http://secunia.com/advisories/28835

http://secunia.com/advisories/28858

http://secunia.com/advisories/28875

http://secunia.com/advisories/28889

http://secunia.com/advisories/28896

http://secunia.com/advisories/28912

http://secunia.com/advisories/28925

http://secunia.com/advisories/28933

http://secunia.com/advisories/28937

http://secunia.com/advisories/29245

http://secunia.com/advisories/30818

http://securitytracker.com/id?1019393

http://wiki.rpath.com/Advisories:rPSA-2008-0052

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052

http://www.debian.org/security/2008/dsa-1494

http://www.mandriva.com/security/advisories?name=MDVSA-2008:043

http://www.mandriva.com/security/advisories?name=MDVSA-2008:044

http://www.redhat.com/support/errata/RHSA-2008-0129.html

http://www.securityfocus.com/archive/1/488009/100/0/threaded

http://www.securityfocus.com/bid/27704

http://www.securityfocus.com/bid/27801

http://www.ubuntu.com/usn/usn-577-1

http://www.vupen.com/english/advisories/2008/0487/references

https://bugzilla.redhat.com/show_bug.cgi?id=432229

https://bugzilla.redhat.com/show_bug.cgi?id=432517

https://issues.rpath.com/browse/RPL-2237

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358

https://www.exploit-db.com/exploits/5092

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html

Details

Source: MITRE

Published: 2008-02-12

Updated: 2018-10-30

Type: CWE-94

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
79445OracleVM 2.1 : kernel (OVMSA-2008-2002)NessusOracleVM Local Security Checks
high
67651Oracle Linux 5 : kernel (ELSA-2008-0129)NessusOracle Linux Local Security Checks
high
60358Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
36924Mandriva Linux Security Advisory : kernel (MDVSA-2008:044)NessusMandriva Local Security Checks
high
36383Mandriva Linux Security Advisory : kernel (MDVSA-2008:043)NessusMandriva Local Security Checks
high
33253openSUSE 10 Security Update : kernel (kernel-5339)NessusSuSE Local Security Checks
high
31092Ubuntu 6.10 / 7.04 / 7.10 : linux-source-2.6.17/20/22 vulnerability (USN-577-1)NessusUbuntu Local Security Checks
high
31090openSUSE 10 Security Update : kernel (kernel-4987)NessusSuSE Local Security Checks
high
31089openSUSE 10 Security Update : kernel (kernel-4986)NessusSuSE Local Security Checks
high
31086RHEL 5 : kernel (RHSA-2008:0129)NessusRed Hat Local Security Checks
high
31078Fedora 7 : kernel-xen-2.6-2.6.21-7.fc7 (2008-1629)NessusFedora Local Security Checks
high
31059Fedora 8 : kernel-xen-2.6-2.6.21-2957.fc8 (2008-1433)NessusFedora Local Security Checks
high
31054CentOS 5 : kernel (CESA-2008:0129)NessusCentOS Local Security Checks
high
31030Fedora 8 : kernel-2.6.23.15-137.fc8 (2008-1423)NessusFedora Local Security Checks
high
31029Fedora 7 : kernel-2.6.23.15-80.fc7 (2008-1422)NessusFedora Local Security Checks
high
31028Debian DSA-1494-2 : linux-2.6 - missing access checksNessusDebian Local Security Checks
high
31027Slackware 12.0 / current : kernel exploit fix (SSA:2008-042-01)NessusSlackware Local Security Checks
high