CVE-2014-4027

LOW
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html

http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618

http://secunia.com/advisories/59134

http://secunia.com/advisories/59777

http://secunia.com/advisories/60564

http://secunia.com/advisories/61310

http://www.openwall.com/lists/oss-security/2014/06/11/1

http://www.ubuntu.com/usn/USN-2334-1

http://www.ubuntu.com/usn/USN-2335-1

https://bugzilla.redhat.com/show_bug.cgi?id=1108744

https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html

Details

Source: MITRE

Published: 2014-06-23

Updated: 2020-08-21

Type: CWE-200

Risk Information

CVSS v2

Base Score: 2.3

Vector: AV:A/AC:M/Au:S/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 4.4

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

Configuration 4

OR

cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*

Configuration 5

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.3.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.4.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.3.0 to 11.6.0 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.4.1 (inclusive)

cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:* versions from 4.0.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:* versions from 4.2.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:* versions from 4.0.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* versions from 3.0.0 to 3.1.1 (inclusive)

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
124837EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1516)NessusHuawei Local Security Checks
critical
124804EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1480)NessusHuawei Local Security Checks
high
99163OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0057) (Dirty COW)NessusOracleVM Local Security Checks
critical
82691OracleVM 3.3 : kernel-uek (OVMSA-2015-0040)NessusOracleVM Local Security Checks
high
81966Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2015-3012)NessusOracle Linux Local Security Checks
high
81800Oracle Linux 7 : kernel (ELSA-2015-0290)NessusOracle Linux Local Security Checks
high
80014Scientific Linux Security Update : kernel on SL7.x x86_64 (20141209)NessusScientific Linux Local Security Checks
high
80005Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3104)NessusOracle Linux Local Security Checks
medium
80004Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3103)NessusOracle Linux Local Security Checks
medium
79876CentOS 7 : kernel (CESA-2014:1971)NessusCentOS Local Security Checks
high
79848RHEL 7 : kernel (RHSA-2014:1971)NessusRed Hat Local Security Checks
high
79845Oracle Linux 7 : kernel (ELSA-2014-1971)NessusOracle Linux Local Security Checks
high
78651SuSE 11.3 Security Update : Linux kernel (SAT Patch Number 9750)NessusSuSE Local Security Checks
high
78650SuSE 11.3 Security Update : Linux kernel (SAT Patch Numbers 9746 / 9749 / 9751)NessusSuSE Local Security Checks
high
78491F5 Networks BIG-IP : Linux kernel vulnerability (SOL15685)NessusF5 Networks Local Security Checks
medium
77492Ubuntu 14.04 LTS : linux vulnerabilities (USN-2337-1)NessusUbuntu Local Security Checks
medium
77491Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2336-1)NessusUbuntu Local Security Checks
medium
77490Ubuntu 12.04 LTS : linux vulnerabilities (USN-2334-1)NessusUbuntu Local Security Checks
high
77074Mandriva Linux Security Advisory : kernel (MDVSA-2014:155)NessusMandriva Local Security Checks
medium
76696RHEL 6 : kernel-rt (RHSA-2014:0913)NessusRed Hat Local Security Checks
high
76564Ubuntu 12.04 LTS : linux-lts-quantal vulnerabilities (USN-2285-1)NessusUbuntu Local Security Checks
high