7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
58.7%
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
Recent assessments:
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
git.kernel.org?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8404663f81d212918ff85f493649a7991209fa04
www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282
www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5
www.openwall.com/lists/oss-security/2013/11/14/11
www.securityfocus.com/bid/63734
www.ubuntu.com/usn/USN-2067-1
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6282
github.com/torvalds/linux/commit/8404663f81d212918ff85f493649a7991209fa04
www.exploit-db.com/exploits/40975