Amazon Linux AMI : kernel Privilege Escalation (ALAS-2013-190)

High Nessus Plugin ID 73126


The remote Amazon Linux AMI host is missing a security update.


A flaw was found in the way index into perf_swevent_enabled array was sanitized. A local, unprivileged user could leverage this flaw to gain elevated privileges on the system.


Run 'yum update kernel' to update the system. A reboot will be necessary for the new kernel to be loaded.

See Also

Plugin Details

Severity: High

ID: 73126

File Name: ala_ALAS-2013-190.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2014/03/20

Updated: 2018/06/27

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/05/14

Exploitable With


Core Impact

Reference Information

CVE: CVE-2013-2094

BID: 59846

ALAS: 2013-190

CERT: 774103

EDB-ID: 25444, 26131