Lucene search

K
saintSAINT CorporationSAINT:58F657BC1DD46A0850A96857BC5FA43B
HistoryDec 03, 2014 - 12:00 a.m.

Linux kernel futex_requeue privilege elevation

2014-12-0300:00:00
SAINT Corporation
my.saintcorporation.com
73

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

46.7%

Added: 12/03/2014
CVE: CVE-2014-3153
BID: 67906
OSVDB: 107752

Background

The futex system call in Linux provides a mechanism for user-space locking.

Problem

A vulnerability in the Linux kernel allows an unprivileged user to gain root access using a specially crafted **futex_requeue** call.

Resolution

Upgrade to a fixed kernel package from your Linux vendor.

References

<https://lists.debian.org/debian-security-announce/2014/msg00130.html&gt;

Limitations

Exploit works on CentOS 7 and Red Hat 7 and requires an existing unprivileged shell connection to the target.

Platforms

Linux

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

46.7%