CVE-2009-1185

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.

References

http://git.kernel.org/?p=linux/hotplug/udev.git;a=commitdiff;h=e2b362d9f23d4c63018709ab5f81a02f72b91e75

http://git.kernel.org/?p=linux/hotplug/udev.git;a=commitdiff;h=e86a923d508c2aed371cdd958ce82489cf2ab615

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html

http://lists.vmware.com/pipermail/security-announce/2009/000060.html

http://secunia.com/advisories/34731

http://secunia.com/advisories/34750

http://secunia.com/advisories/34753

http://secunia.com/advisories/34771

http://secunia.com/advisories/34776

http://secunia.com/advisories/34785

http://secunia.com/advisories/34787

http://secunia.com/advisories/34801

http://secunia.com/advisories/35766

http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.446399

http://wiki.rpath.com/Advisories:rPSA-2009-0063

http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0063

http://www.debian.org/security/2009/dsa-1772

http://www.gentoo.org/security/en/glsa/glsa-200904-18.xml

http://www.mandriva.com/security/advisories?name=MDVSA-2009:103

http://www.mandriva.com/security/advisories?name=MDVSA-2009:104

http://www.redhat.com/support/errata/RHSA-2009-0427.html

http://www.securityfocus.com/archive/1/502752/100/0/threaded

http://www.securityfocus.com/archive/1/504849/100/0/threaded

http://www.securityfocus.com/bid/34536

http://www.securitytracker.com/id?1022067

http://www.ubuntu.com/usn/usn-758-1

http://www.vmware.com/security/advisories/VMSA-2009-0009.html

http://www.vupen.com/english/advisories/2009/1053

http://www.vupen.com/english/advisories/2009/1865

https://bugzilla.redhat.com/show_bug.cgi?id=495051

https://launchpad.net/bugs/cve/2009-1185

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10925

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5975

https://www.exploit-db.com/exploits/8572

https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00462.html

https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00463.html

Details

Source: MITRE

Published: 2009-04-17

Updated: 2018-10-10

Type: CWE-20

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:kernel:udev:0.0.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.4-1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.5-1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.8-1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.0.9-1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.0-1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.1-1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.1.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.2.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.3.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.4.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.5.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.6.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.7.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.8.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:0.9.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.0.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.1.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.5:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.7:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.8:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:1.3.9:*:*:*:*:*:*:*

cpe:2.3:a:kernel:udev:*:*:*:*:*:*:*:* versions up to 1.4.0 (inclusive)

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
89115VMware ESX Multiple Vulnerabilities (VMSA-2009-0009) (remote check)NessusMisc.
high
79454OracleVM 2.1 : udev (OVMSA-2009-0006)NessusOracleVM Local Security Checks
high
67842Oracle Linux 5 : udev (ELSA-2009-0427)NessusOracle Linux Local Security Checks
high
60570Scientific Linux Security Update : udev on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
52011VMSA-2009-0009 : ESX Service Console updates for udev, sudo, and curlNessusVMware ESX Local Security Checks
high
43742CentOS 5 : udev (CESA-2009:0427)NessusCentOS Local Security Checks
high
41594SuSE 10 Security Update : udev (ZYPP Patch Number 6203)NessusSuSE Local Security Checks
high
41593SuSE 10 Security Update : udev (ZYPP Patch Number 6153)NessusSuSE Local Security Checks
high
41432SuSE 11 Security Update : udev (SAT Patch Number 766)NessusSuSE Local Security Checks
high
40271openSUSE Security Update : libudev-devel (libudev-devel-768)NessusSuSE Local Security Checks
high
40050openSUSE Security Update : libudev-devel (libudev-devel-768)NessusSuSE Local Security Checks
high
38658Mandriva Linux Security Advisory : udev (MDVSA-2009:103-1)NessusMandriva Local Security Checks
high
36703Fedora 10 : udev-127-5.fc10 (2009-3711)NessusFedora Local Security Checks
high
36530Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : udev vulnerabilities (USN-758-1)NessusUbuntu Local Security Checks
high
36197GLSA-200904-18 : udev: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
36186Slackware 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / current : udev (SSA:2009-111-01)NessusSlackware Local Security Checks
high
36182openSUSE 10 Security Update : libudev-devel (libudev-devel-6158)NessusSuSE Local Security Checks
high
36177RHEL 5 : udev (RHSA-2009:0427)NessusRed Hat Local Security Checks
high
36175Fedora 9 : udev-124-4.fc9 (2009-3712)NessusFedora Local Security Checks
high
36172Debian DSA-1772-1 : udev - several vulnerabilitiesNessusDebian Local Security Checks
high