CVE-2014-0196

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

References

http://bugzilla.novell.com/show_bug.cgi?id=875690

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00

http://linux.oracle.com/errata/ELSA-2014-0771.html

http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html

http://pastebin.com/raw.php?i=yTSFUBgZ

http://rhn.redhat.com/errata/RHSA-2014-0512.html

http://secunia.com/advisories/59218

http://secunia.com/advisories/59262

http://secunia.com/advisories/59599

http://source.android.com/security/bulletin/2016-07-01.html

http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html

http://www.debian.org/security/2014/dsa-2926

http://www.debian.org/security/2014/dsa-2928

http://www.exploit-db.com/exploits/33516

http://www.openwall.com/lists/oss-security/2014/05/05/6

http://www.osvdb.org/106646

http://www.ubuntu.com/usn/USN-2196-1

http://www.ubuntu.com/usn/USN-2197-1

http://www.ubuntu.com/usn/USN-2198-1

http://www.ubuntu.com/usn/USN-2199-1

http://www.ubuntu.com/usn/USN-2200-1

http://www.ubuntu.com/usn/USN-2201-1

http://www.ubuntu.com/usn/USN-2202-1

http://www.ubuntu.com/usn/USN-2203-1

http://www.ubuntu.com/usn/USN-2204-1

https://bugzilla.redhat.com/show_bug.cgi?id=1094232

https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00

Details

Source: MITRE

Published: 2014-05-07

Updated: 2020-08-19

Type: CWE-362

Risk Information

CVSS v2

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.14.3 (inclusive)

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:*

cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*

Configuration 5

OR

cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Configuration 7

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.3.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.4.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.3.0 to 11.5.1 (inclusive)

cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.4.1 (inclusive)

cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:* versions from 4.0.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:* versions from 4.2.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:* versions from 4.0.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* versions from 3.1.0 to 3.1.1 (inclusive)

Tenable Plugins

View all (33 total)

IDNameProductFamilySeverity
124986EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1533)NessusHuawei Local Security Checks
high
124803EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1479)NessusHuawei Local Security Checks
critical
99163OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0057) (Dirty COW)NessusOracleVM Local Security Checks
critical
81800Oracle Linux 7 : kernel (ELSA-2015-0290)NessusOracle Linux Local Security Checks
high
79021RHEL 6 : kernel (RHSA-2014:0520)NessusRed Hat Local Security Checks
critical
79020RHEL 6 : kernel (RHSA-2014:0512)NessusRed Hat Local Security Checks
medium
78335Amazon Linux AMI : kernel (ALAS-2014-392)NessusAmazon Linux Local Security Checks
high
78282Amazon Linux AMI : kernel (ALAS-2014-339)NessusAmazon Linux Local Security Checks
medium
78173F5 Networks BIG-IP : Linux kernel TTY vulnerability (K15319)NessusF5 Networks Local Security Checks
medium
76928Oracle Linux 5 / 6 : unbreakable enterprise kernel (ELSA-2014-3054)NessusOracle Linux Local Security Checks
medium
76927Oracle Linux 5 / 6 : unbreakable enterprise kernel (ELSA-2014-3053)NessusOracle Linux Local Security Checks
medium
76890RHEL 7 : kernel (RHSA-2014:0678)NessusRed Hat Local Security Checks
medium
76728Oracle Linux 7 : kernel (ELSA-2014-0678)NessusOracle Linux Local Security Checks
medium
76677RHEL 6 : MRG (RHSA-2014:0557)NessusRed Hat Local Security Checks
high
76295Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2260-1)NessusUbuntu Local Security Checks
high
75364openSUSE Security Update : kernel (openSUSE-SU-2014:0677-1)NessusSuSE Local Security Checks
high
75363openSUSE Security Update : kernel (openSUSE-SU-2014:0678-1)NessusSuSE Local Security Checks
critical
74513Mandriva Linux Security Advisory : kernel (MDVSA-2014:124)NessusMandriva Local Security Checks
critical
74132Fedora 19 : kernel-3.14.4-100.fc19 (2014-6354)NessusFedora Local Security Checks
high
74101Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2014-3034)NessusOracle Linux Local Security Checks
critical
74033SuSE 11.3 Security Update : Linux Kernel (SAT Patch Numbers 9233 / 9236 / 9237)NessusSuSE Local Security Checks
high
74027Debian DSA-2928-1 : linux-2.6 - privilege escalation/denial of service/information leakNessusDebian Local Security Checks
high
73971Debian DSA-2926-1 : linux - security updateNessusDebian Local Security Checks
high
73957Fedora 20 : kernel-3.14.3-200.fc20 (2014-6122)NessusFedora Local Security Checks
medium
73893Ubuntu 14.04 LTS : linux vulnerability (USN-2204-1)NessusUbuntu Local Security Checks
medium
73892Ubuntu 13.10 : linux vulnerability (USN-2203-1)NessusUbuntu Local Security Checks
medium
73891Ubuntu 12.10 : linux vulnerability (USN-2202-1)NessusUbuntu Local Security Checks
medium
73890Ubuntu 12.04 LTS : linux-lts-saucy vulnerability (USN-2201-1)NessusUbuntu Local Security Checks
medium
73889Ubuntu 12.04 LTS : linux-lts-raring vulnerability (USN-2200-1)NessusUbuntu Local Security Checks
medium
73888Ubuntu 12.04 LTS : linux-lts-quantal vulnerability (USN-2199-1)NessusUbuntu Local Security Checks
medium
73887Ubuntu 12.04 LTS : linux vulnerability (USN-2198-1)NessusUbuntu Local Security Checks
medium
73886Ubuntu 10.04 LTS : linux-ec2 vulnerability (USN-2197-1)NessusUbuntu Local Security Checks
medium
73885Ubuntu 10.04 LTS : linux vulnerability (USN-2196-1)NessusUbuntu Local Security Checks
medium