-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Linux Kernel sock_sendpage() Local Privilege Escalation Vulnerability
http://www.cert-in.org.in/vulnerability/civn-2009-108.htm
Original Issue Date: September 07, 2009
Severity Rating:High
System Affected
Linux Kernel versions prior to 2.4.37.5
Linux Kernel versions prior to 2.6.30.5
Linux Kernel versions prior to 2.6.31-rc6
Overview
A vulnerability has been reported in Linux kernel, which could be exploited
by local attackers to gain elevated privileges.
Description
This vulnerability is caused by a NULL pointer dereference error due to
improper initialization of all function pointers for socket operations in
"proto_ops" structures in Linux kernel . A Local attacker could exploit
this vulnerability by using the "sock_sendpage()" function to invoke a
vulnerable socket operation. Successful exploitation of this vulnerability
could allow a local attacker to execute arbitrary code with elevated kernel
privileges.
Solution
Upgrade to Linux Kernel version 2.4.37.5 or 2.6.30.5 or 2.6.31-rc6
http://www.kernel.org/
Vendor Information
kernel.org
http://www.kernel.org/
References
kernel.org
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.5
GIT
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h
=e694958388c50148389b0e9b9e9e8945cf0f1b98
Secunia
http://secunia.com/advisories/36289/3/
SecurityFocus
http://www.securityfocus.com/bid/36038
SecurityTracker
http://securitytracker.com/alerts/2009/Aug/1022732.html
VUPEN
http://www.vupen.com/english/advisories/2009/2272
CVE Name
CVE-2009-2692
Disclaimer
The information provided herein is on "as is" basis, without warranty of
any kind.
Contact Information
Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In)
Ministry of Communications and Information Technology
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
Note: Please do not reply to this e-mail. For further queries contact
CERT-In Information Desk. Email: info@cert-in.org.in
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8
wsBVAwUBSqUKd3WXeYNsoT30AQr9HQf/Yz8Vp+BDxGrvqswBn+YCQhHoC7DCwwY0
DgzLJuPiiNESxwvxMr+6yeeYvu/Pxa6t9T/huEw9iGEej1kFruLbxyU7TUQW9LBX
rg79BkGxZGC4fHYrQm/iBl0xlA1hhojqt4HhcosteUPzYTuh505HbToGVj5dy7oD
LsPAndm2X9clDgEAHGtRi7hiHWcXlrP5pDjNOwr6A0h6vvLoSL5nmrGNAc6uuEy8
B5yK9CscDw48Z9GGr++6g6pK0BDGEXV4PJuzSTk3doRYH92sshUbcqjAbLMEZbeJ
QYWy/I1dqX3j27Hba2u0gBPFiPehRJrPRPVAL/2pC3LhJqEz+rS5Bg==
=AyJF
-----END PGP SIGNATURE-----

No comments:
Post a Comment