Lucene search

K
nvd[email protected]NVD:CVE-2008-0600
HistoryFeb 12, 2008 - 9:00 p.m.

CVE-2008-0600

2008-02-1221:00:00
CWE-94
web.nvd.nist.gov

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.17
OR
linuxlinux_kernelMatch2.6.17rc1
OR
linuxlinux_kernelMatch2.6.17rc2
OR
linuxlinux_kernelMatch2.6.17rc3
OR
linuxlinux_kernelMatch2.6.17rc4
OR
linuxlinux_kernelMatch2.6.17rc5
OR
linuxlinux_kernelMatch2.6.17rc6
OR
linuxlinux_kernelMatch2.6.17.1
OR
linuxlinux_kernelMatch2.6.17.2
OR
linuxlinux_kernelMatch2.6.17.3
OR
linuxlinux_kernelMatch2.6.17.4
OR
linuxlinux_kernelMatch2.6.17.5
OR
linuxlinux_kernelMatch2.6.17.6
OR
linuxlinux_kernelMatch2.6.17.7
OR
linuxlinux_kernelMatch2.6.17.8
OR
linuxlinux_kernelMatch2.6.17.9
OR
linuxlinux_kernelMatch2.6.17.10
OR
linuxlinux_kernelMatch2.6.17.11
OR
linuxlinux_kernelMatch2.6.17.12
OR
linuxlinux_kernelMatch2.6.17.13
OR
linuxlinux_kernelMatch2.6.17.14
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18rc1
OR
linuxlinux_kernelMatch2.6.18rc2
OR
linuxlinux_kernelMatch2.6.18rc3
OR
linuxlinux_kernelMatch2.6.18rc4
OR
linuxlinux_kernelMatch2.6.18rc5
OR
linuxlinux_kernelMatch2.6.18rc6
OR
linuxlinux_kernelMatch2.6.18rc7
OR
linuxlinux_kernelMatch2.6.18.1
OR
linuxlinux_kernelMatch2.6.18.2
OR
linuxlinux_kernelMatch2.6.18.3
OR
linuxlinux_kernelMatch2.6.18.4
OR
linuxlinux_kernelMatch2.6.18.5
OR
linuxlinux_kernelMatch2.6.18.6
OR
linuxlinux_kernelMatch2.6.18.7
OR
linuxlinux_kernelMatch2.6.18.8
OR
linuxlinux_kernelMatch2.6.19
OR
linuxlinux_kernelMatch2.6.19rc1
OR
linuxlinux_kernelMatch2.6.19rc2
OR
linuxlinux_kernelMatch2.6.19rc3
OR
linuxlinux_kernelMatch2.6.19rc4
OR
linuxlinux_kernelMatch2.6.19.1
OR
linuxlinux_kernelMatch2.6.19.2
OR
linuxlinux_kernelMatch2.6.19.3
OR
linuxlinux_kernelMatch2.6.20
OR
linuxlinux_kernelMatch2.6.20rc2
OR
linuxlinux_kernelMatch2.6.20.1
OR
linuxlinux_kernelMatch2.6.20.2
OR
linuxlinux_kernelMatch2.6.20.3
OR
linuxlinux_kernelMatch2.6.20.4
OR
linuxlinux_kernelMatch2.6.20.5
OR
linuxlinux_kernelMatch2.6.20.6
OR
linuxlinux_kernelMatch2.6.20.7
OR
linuxlinux_kernelMatch2.6.20.8
OR
linuxlinux_kernelMatch2.6.20.9
OR
linuxlinux_kernelMatch2.6.20.10
OR
linuxlinux_kernelMatch2.6.20.11
OR
linuxlinux_kernelMatch2.6.20.12
OR
linuxlinux_kernelMatch2.6.20.13
OR
linuxlinux_kernelMatch2.6.20.14
OR
linuxlinux_kernelMatch2.6.20.15
OR
linuxlinux_kernelMatch2.6.21
OR
linuxlinux_kernelMatch2.6.21git1
OR
linuxlinux_kernelMatch2.6.21git2
OR
linuxlinux_kernelMatch2.6.21git3
OR
linuxlinux_kernelMatch2.6.21git4
OR
linuxlinux_kernelMatch2.6.21git5
OR
linuxlinux_kernelMatch2.6.21git6
OR
linuxlinux_kernelMatch2.6.21git7
OR
linuxlinux_kernelMatch2.6.21rc3
OR
linuxlinux_kernelMatch2.6.21rc4
OR
linuxlinux_kernelMatch2.6.21rc5
OR
linuxlinux_kernelMatch2.6.21rc6
OR
linuxlinux_kernelMatch2.6.21rc7
OR
linuxlinux_kernelMatch2.6.21.1
OR
linuxlinux_kernelMatch2.6.21.2
OR
linuxlinux_kernelMatch2.6.21.3
OR
linuxlinux_kernelMatch2.6.21.4
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22rc6
OR
linuxlinux_kernelMatch2.6.22.1
OR
linuxlinux_kernelMatch2.6.22.3
OR
linuxlinux_kernelMatch2.6.22.4
OR
linuxlinux_kernelMatch2.6.22.5
OR
linuxlinux_kernelMatch2.6.22.6
OR
linuxlinux_kernelMatch2.6.22.7
OR
linuxlinux_kernelMatch2.6.22.16
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23rc1
OR
linuxlinux_kernelMatch2.6.23rc2
OR
linuxlinux_kernelMatch2.6.23.1
OR
linuxlinux_kernelMatch2.6.23.2
OR
linuxlinux_kernelMatch2.6.23.3
OR
linuxlinux_kernelMatch2.6.23.4
OR
linuxlinux_kernelMatch2.6.23.5
OR
linuxlinux_kernelMatch2.6.23.6
OR
linuxlinux_kernelMatch2.6.23.7
OR
linuxlinux_kernelMatch2.6.23.9
OR
linuxlinux_kernelMatch2.6.23.14
OR
linuxlinux_kernelMatch2.6.24
OR
linuxlinux_kernelMatch2.6.24rc2
OR
linuxlinux_kernelMatch2.6.24rc3
OR
linuxlinux_kernelMatch2.6.24.1

References

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%