Lucene search

K
saintSAINT CorporationSAINT:166CE96C450C6779DEE6805A21CC7AFA
HistoryMay 13, 2014 - 12:00 a.m.

Linux kernel __sock_diag_rcv_msg Netlink message privilege elevation

2014-05-1300:00:00
SAINT Corporation
download.saintcorporation.com
14

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.0%

Added: 05/13/2014
CVE: CVE-2013-1763
BID: 58137
OSVDB: 90604

Background

Netlink is a feature of the Linux kernel which allows communication between kernel and user space.

Problem

An array index error in the **__sock_diag_rcv_msg** function in the Linux kernel allows local users to gain root privileges by sending a Netlink message with a large family value.

Resolution

Upgrade to Linux kernel 3.7.10 or higher or install the appropriate package update from the operating system vendor.

References

<http://seclists.org/oss-sec/2013/q1/420&gt;
<https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.10&gt;

Limitations

Exploit works on Ubuntu or Fedora and requires an existing unprivileged shell connection to the target.

Platforms

Linux

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.0%