Tuesday, September 8, 2009

CERT-In Vulnerability Note CIVN-2009-108

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Linux Kernel sock_sendpage() Local Privilege Escalation Vulnerability
http://www.cert-in.org.in/vulnerability/civn-2009-108.htm
Original Issue Date: September 07, 2009

Severity Rating:High

System Affected

Linux Kernel versions prior to 2.4.37.5
Linux Kernel versions prior to 2.6.30.5
Linux Kernel versions prior to 2.6.31-rc6

Overview

A vulnerability has been reported in Linux kernel, which could be exploited
by local attackers to gain elevated privileges.

Description

This vulnerability is caused by a NULL pointer dereference error due to
improper initialization of all function pointers for socket operations in
"proto_ops" structures in Linux kernel . A Local attacker could exploit
this vulnerability by using the "sock_sendpage()" function to invoke a
vulnerable socket operation. Successful exploitation of this vulnerability
could allow a local attacker to execute arbitrary code with elevated kernel
privileges.

Solution

Upgrade to Linux Kernel version 2.4.37.5 or 2.6.30.5 or 2.6.31-rc6
http://www.kernel.org/

Vendor Information

kernel.org
http://www.kernel.org/

References

kernel.org
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.5

GIT
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h
=e694958388c50148389b0e9b9e9e8945cf0f1b98

Secunia
http://secunia.com/advisories/36289/3/

SecurityFocus
http://www.securityfocus.com/bid/36038

SecurityTracker
http://securitytracker.com/alerts/2009/Aug/1022732.html

VUPEN
http://www.vupen.com/english/advisories/2009/2272

CVE Name
CVE-2009-2692
Disclaimer

The information provided herein is on "as is" basis, without warranty of
any kind.

Contact Information


Phone: +91-11-24368572

Postal address

Indian Computer Emergency Response Team (CERT-In)
Ministry of Communications and Information Technology
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003


Note: Please do not reply to this e-mail. For further queries contact
CERT-In Information Desk. Email: info@cert-in.org.in


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wsBVAwUBSqUKd3WXeYNsoT30AQr9HQf/Yz8Vp+BDxGrvqswBn+YCQhHoC7DCwwY0
DgzLJuPiiNESxwvxMr+6yeeYvu/Pxa6t9T/huEw9iGEej1kFruLbxyU7TUQW9LBX
rg79BkGxZGC4fHYrQm/iBl0xlA1hhojqt4HhcosteUPzYTuh505HbToGVj5dy7oD
LsPAndm2X9clDgEAHGtRi7hiHWcXlrP5pDjNOwr6A0h6vvLoSL5nmrGNAc6uuEy8
B5yK9CscDw48Z9GGr++6g6pK0BDGEXV4PJuzSTk3doRYH92sshUbcqjAbLMEZbeJ
QYWy/I1dqX3j27Hba2u0gBPFiPehRJrPRPVAL/2pC3LhJqEz+rS5Bg==
=AyJF
-----END PGP SIGNATURE-----

No comments: