CVE-2009-0748

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

References

http://bugzilla.kernel.org/show_bug.cgi?id=12371

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ec110281379826c5cf6ed14735e47027c3c5765

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7

http://osvdb.org/52203

http://rhn.redhat.com/errata/RHSA-2009-1243.html

http://secunia.com/advisories/34394

http://secunia.com/advisories/36562

http://secunia.com/advisories/37471

http://www.debian.org/security/2009/dsa-1749

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.ubuntu.com/usn/usn-751-1

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2009/0509

http://www.vupen.com/english/advisories/2009/3316

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10683

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8526

Details

Source: MITRE

Published: 2009-02-27

Updated: 2018-10-10

Type: CWE-20

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
79507OracleVM 2.2 : kernel (OVMSA-2013-0039)NessusOracleVM Local Security Checks
high
43779CentOS 5 : kernel (CESA-2009:1243)NessusCentOS Local Security Checks
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
medium
40835RHEL 5 : kernel (RHSA-2009:1243)NessusRed Hat Local Security Checks
medium
37337Ubuntu 7.10 / 8.04 LTS / 8.10 : linux, linux-source-2.6.22 vulnerabilities (USN-751-1)NessusUbuntu Local Security Checks
critical
35987Debian DSA-1749-1 : linux-2.6 - denial of service/privilege escalation/sensitive memory leakNessusDebian Local Security Checks
critical