Lucene search

K
cve[email protected]CVE-2014-0205
HistorySep 28, 2014 - 7:55 p.m.

CVE-2014-0205

2014-09-2819:55:05
CWE-119
web.nvd.nist.gov
61
3
cve-2014-0205
futex_wait
kernel/futex.c
linux kernel
denial of service
use-after-free
system crash
privilege escalation

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.6%

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.36.4
OR
linuxlinux_kernelMatch2.6.36
OR
linuxlinux_kernelMatch2.6.36rc1
OR
linuxlinux_kernelMatch2.6.36rc2
OR
linuxlinux_kernelMatch2.6.36rc3
OR
linuxlinux_kernelMatch2.6.36rc4
OR
linuxlinux_kernelMatch2.6.36rc5
OR
linuxlinux_kernelMatch2.6.36rc6
OR
linuxlinux_kernelMatch2.6.36rc7
OR
linuxlinux_kernelMatch2.6.36rc8
OR
linuxlinux_kernelMatch2.6.36.1
OR
linuxlinux_kernelMatch2.6.36.2
OR
linuxlinux_kernelMatch2.6.36.3

Social References

More

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.6%