Lucene search

K
cve[email protected]CVE-2014-3917
HistoryJun 05, 2014 - 5:55 p.m.

CVE-2014-3917

2014-06-0517:55:07
CWE-200
web.nvd.nist.gov
105
cve-2014-3917
linux kernel
auditsc.c
config_auditsyscall
syscall rules
local users
kernel memory
denial of service
oops
nvd

3.3 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:N/A:P

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

Affected configurations

NVD
Node
suselinux_enterprise_desktopMatch10.0sp4lts
Node
redhatenterprise_linuxMatch5
OR
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_mrgMatch2.0
Node
linuxlinux_kernelRange3.14.5
OR
linuxlinux_kernelMatch3.14-
OR
linuxlinux_kernelMatch3.14rc1
OR
linuxlinux_kernelMatch3.14rc2
OR
linuxlinux_kernelMatch3.14rc3
OR
linuxlinux_kernelMatch3.14rc4
OR
linuxlinux_kernelMatch3.14rc5
OR
linuxlinux_kernelMatch3.14rc6
OR
linuxlinux_kernelMatch3.14rc7
OR
linuxlinux_kernelMatch3.14rc8
OR
linuxlinux_kernelMatch3.14.1
OR
linuxlinux_kernelMatch3.14.2
OR
linuxlinux_kernelMatch3.14.3
OR
linuxlinux_kernelMatch3.14.4

3.3 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:N/A:P

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%