Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2009-0835

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-06 Mar, 2009 | 11:00
Updated At-07 Aug, 2024 | 04:48
Rejected At-
Credits

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:06 Mar, 2009 | 11:00
Updated At:07 Aug, 2024 | 04:48
Rejected At:
▼CVE Numbering Authority (CNA)

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/35390
third-party-advisory
x_refsource_SECUNIA
http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html
x_refsource_MISC
http://secunia.com/advisories/34786
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
vendor-advisory
x_refsource_MANDRIVA
http://marc.info/?l=oss-security&m=123597627132485&w=2
mailing-list
x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
vendor-advisory
x_refsource_SUSE
http://scary.beasts.org/security/CESA-2009-001.html
x_refsource_MISC
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
vendor-advisory
x_refsource_SUSE
http://www.ubuntu.com/usn/usn-751-1
vendor-advisory
x_refsource_UBUNTU
http://www.securityfocus.com/bid/33948
vdb-entry
x_refsource_BID
http://secunia.com/advisories/35185
third-party-advisory
x_refsource_SECUNIA
http://lkml.org/lkml/2009/2/28/23
mailing-list
x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
vendor-advisory
x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/34084
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1800
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/34917
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=linux-kernel&m=123579056530191&w=2
mailing-list
x_refsource_MLIST
http://marc.info/?l=linux-kernel&m=123579069630311&w=2
mailing-list
x_refsource_MLIST
http://scary.beasts.org/security/CESA-2009-004.html
x_refsource_MISC
https://bugzilla.redhat.com/show_bug.cgi?id=487255
x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2009-0451.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/35121
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/35394
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/35390
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/34786
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://marc.info/?l=oss-security&m=123597627132485&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://scary.beasts.org/security/CESA-2009-001.html
Resource:
x_refsource_MISC
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.ubuntu.com/usn/usn-751-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.securityfocus.com/bid/33948
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/35185
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lkml.org/lkml/2009/2/28/23
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/34084
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2009/dsa-1800
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/34917
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=linux-kernel&m=123579056530191&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://marc.info/?l=linux-kernel&m=123579069630311&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://scary.beasts.org/security/CESA-2009-004.html
Resource:
x_refsource_MISC
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=487255
Resource:
x_refsource_MISC
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-0451.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/35121
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/35394
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/35390
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/34786
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://marc.info/?l=oss-security&m=123597627132485&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://scary.beasts.org/security/CESA-2009-001.html
x_refsource_MISC
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.ubuntu.com/usn/usn-751-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.securityfocus.com/bid/33948
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/35185
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lkml.org/lkml/2009/2/28/23
mailing-list
x_refsource_MLIST
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/34084
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2009/dsa-1800
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/34917
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=linux-kernel&m=123579056530191&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://marc.info/?l=linux-kernel&m=123579069630311&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://scary.beasts.org/security/CESA-2009-004.html
x_refsource_MISC
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=487255
x_refsource_MISC
x_transferred
http://www.redhat.com/support/errata/RHSA-2009-0451.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/35121
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/35394
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/35390
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/34786
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://marc.info/?l=oss-security&m=123597627132485&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://scary.beasts.org/security/CESA-2009-001.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-751-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.securityfocus.com/bid/33948
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/35185
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lkml.org/lkml/2009/2/28/23
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/34084
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2009/dsa-1800
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/34917
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=linux-kernel&m=123579056530191&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://marc.info/?l=linux-kernel&m=123579069630311&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://scary.beasts.org/security/CESA-2009-004.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=487255
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-0451.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/35121
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/35394
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:06 Mar, 2009 | 11:30
Updated At:19 Mar, 2012 | 04:00

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.03.6LOW
AV:L/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 3.6
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25
cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.1
cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.2
cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.3
cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.4
cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.5
cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.6
cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.7
cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.8
cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.9
cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.10
cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.11
cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>2.6.25.12
cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2009-05-19T00:00:00

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5. It was addressed in Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-0451.html .

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.htmlcve@mitre.org
N/A
http://lkml.org/lkml/2009/2/28/23cve@mitre.org
N/A
http://marc.info/?l=linux-kernel&m=123579056530191&w=2cve@mitre.org
N/A
http://marc.info/?l=linux-kernel&m=123579069630311&w=2cve@mitre.org
Exploit
http://marc.info/?l=oss-security&m=123597627132485&w=2cve@mitre.org
N/A
http://scary.beasts.org/security/CESA-2009-001.htmlcve@mitre.org
Exploit
http://scary.beasts.org/security/CESA-2009-004.htmlcve@mitre.org
N/A
http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.htmlcve@mitre.org
N/A
http://secunia.com/advisories/34084cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/34786cve@mitre.org
N/A
http://secunia.com/advisories/34917cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35121cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35185cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35390cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35394cve@mitre.org
Vendor Advisory
http://www.debian.org/security/2009/dsa-1800cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:118cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2009-0451.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/33948cve@mitre.org
N/A
http://www.ubuntu.com/usn/usn-751-1cve@mitre.org
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=487255cve@mitre.org
Exploit
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lkml.org/lkml/2009/2/28/23
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=linux-kernel&m=123579056530191&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=linux-kernel&m=123579069630311&w=2
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://marc.info/?l=oss-security&m=123597627132485&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://scary.beasts.org/security/CESA-2009-001.html
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://scary.beasts.org/security/CESA-2009-004.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34084
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/34786
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34917
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35121
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35185
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35390
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35394
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.debian.org/security/2009/dsa-1800
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-0451.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/33948
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-751-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=487255
Source: cve@mitre.org
Resource:
Exploit

Change History

0
Information is not available yet

Similar CVEs

65Records found

CVE-2008-3395
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.29% / 52.22%
||
7 Day CHG~0.00%
Published-31 Jul, 2008 | 16:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Calacode @Mail 5.41 on Linux uses weak world-readable permissions for (1) webmail/libs/Atmail/Config.php and (2) webmail/webadmin/.htpasswd, which allows local users to obtain sensitive information by reading these files. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Action-Not Available
Vendor-calacoden/aLinux Kernel Organization, Inc
Product-atmaillinux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2008-2137
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.09% / 26.08%
||
7 Day CHG~0.00%
Published-29 May, 2008 | 16:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2007-3740
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.12% / 32.29%
||
7 Day CHG~0.00%
Published-14 Sep, 2007 | 01:00
Updated-07 Aug, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2008-2148
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-3.6||LOW
EPSS-0.07% / 20.39%
||
7 Day CHG~0.00%
Published-12 May, 2008 | 21:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2008-1628
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.45% / 62.66%
||
7 Day CHG~0.00%
Published-02 Apr, 2008 | 17:00
Updated-07 Aug, 2024 | 08:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-auditn/a
CWE ID-CWE-264
Not Available
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-1810
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 21.62%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSAP SE
Product-maxdblinux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2007-6209
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 20.94%
||
7 Day CHG~0.00%
Published-04 Dec, 2007 | 00:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.

Action-Not Available
Vendor-zshn/aLinux Kernel Organization, Inc
Product-linux_kernelzshn/a
CWE ID-CWE-264
Not Available
CVE-2007-6246
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.25% / 48.55%
||
7 Day CHG~0.00%
Published-20 Dec, 2007 | 01:00
Updated-07 Aug, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0, when running on Linux, uses insecure permissions for memory, which might allow local users to gain privileges.

Action-Not Available
Vendor-n/aAdobe Inc.Linux Kernel Organization, Inc
Product-flash_playerlinux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2007-6434
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.06% / 17.49%
||
7 Day CHG~0.00%
Published-18 Dec, 2007 | 20:00
Updated-07 Aug, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linux kernel 2.6.23 allows local users to create low pages in virtual userspace memory and bypass mmap_min_addr protection via a crafted executable file that calls the do_brk function.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2007-6048
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.76% / 72.34%
||
7 Day CHG~0.00%
Published-20 Nov, 2007 | 20:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unknown impact and attack vectors. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.

Action-Not Available
Vendor-unixn/aIBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsunixlinux_kerneldb2_universal_databasen/a
CWE ID-CWE-264
Not Available
CVE-2007-6047
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.65% / 69.93%
||
7 Day CHG~0.00%
Published-20 Nov, 2007 | 20:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART.

Action-Not Available
Vendor-unixn/aIBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsunixlinux_kerneldb2_universal_databasen/a
CWE ID-CWE-264
Not Available
CVE-2007-6050
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.42%
||
7 Day CHG~0.00%
Published-20 Nov, 2007 | 20:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, related to creation of an "insecure directory."

Action-Not Available
Vendor-unixn/aIBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsunixlinux_kerneldb2_universal_databasen/a
CWE ID-CWE-264
Not Available
CVE-2007-4573
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.16% / 37.63%
||
7 Day CHG~0.00%
Published-24 Sep, 2007 | 22:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-264
Not Available
CVE-2007-5936
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.6||LOW
EPSS-0.09% / 26.46%
||
7 Day CHG~0.00%
Published-13 Nov, 2007 | 22:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dvips in teTeX and TeXlive 2007 and earlier allows local users to obtain sensitive information and modify certain data by creating certain temporary files before they are processed by dviljk, which can then be read or modified in place.

Action-Not Available
Vendor-tugtetexn/a
Product-tetextexlive_2007n/a
CWE ID-CWE-264
Not Available
CVE-2007-5851
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.6||LOW
EPSS-0.20% / 42.65%
||
7 Day CHG~0.00%
Published-19 Dec, 2007 | 21:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

iChat in Apple Mac OS X 10.4.11 allows network-adjacent remote attackers to automatically initiate a video connection to another user via unknown vectors.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-264
Not Available
  • Previous
  • 1
  • 2
  • Next
Details not found