CVE-2013-6282

high

Description

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8404663f81d212918ff85f493649a7991209fa04

http://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5

http://www.openwall.com/lists/oss-security/2013/11/14/11

http://www.securityfocus.com/bid/63734

http://www.ubuntu.com/usn/USN-2067-1

https://github.com/torvalds/linux/commit/8404663f81d212918ff85f493649a7991209fa04

https://www.exploit-db.com/exploits/40975/

Details

Source: MITRE

Published: 2013-11-20

Updated: 2017-09-03

Type: CWE-20

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH