[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-1527Date: (C)2009-05-05   (M)2023-12-22


Race condition in the ptrace_attach function in kernel/ptrace.c in the Linux kernel before 2.6.30-rc4 allows local users to gain privileges via a PTRACE_ATTACH ptrace call during an exec system call that is launching a setuid application, related to locking an incorrect cred_exec_mutex object.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.9
Exploit Score: 3.4
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
http://www.securityfocus.com/archive/1/503610/100/0/threaded
BID-34799
SECUNIA-34977
SECUNIA-35120
OSVDB-54188
ADV-2009-1236
http://www.openwall.com/lists/oss-security/2009/05/04/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cad81bc2529ab8c62b6fdc83a1c0c7f4a87209eb
http://wiki.rpath.com/Advisories:rPSA-2009-0084
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc4
linux-kernel-ptraceattach-code-execution(50293)

CPE    4
cpe:/o:linux:linux_kernel
cpe:/o:linux:linux_kernel:2.6.30:rc1
cpe:/o:linux:linux_kernel:2.6.30:rc3
cpe:/o:linux:linux_kernel:2.6.30:rc2
...
CWE    1
CWE-362

© SecPod Technologies