Lucene search

K
saintSAINT CorporationSAINT:62CFE302E8E036752E595883D6BF6332
HistoryDec 03, 2014 - 12:00 a.m.

Linux kernel futex_requeue privilege elevation

2014-12-0300:00:00
SAINT Corporation
download.saintcorporation.com
43

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

47.4%

Added: 12/03/2014
CVE: CVE-2014-3153
BID: 67906
OSVDB: 107752

Background

The futex system call in Linux provides a mechanism for user-space locking.

Problem

A vulnerability in the Linux kernel allows an unprivileged user to gain root access using a specially crafted **futex_requeue** call.

Resolution

Upgrade to a fixed kernel package from your Linux vendor.

References

<https://lists.debian.org/debian-security-announce/2014/msg00130.html&gt;

Limitations

Exploit works on CentOS 7 and Red Hat 7 and requires an existing unprivileged shell connection to the target.

Platforms

Linux

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

47.4%