7.2
CVSSv2

CVE-2008-2812

Published: 09/07/2008 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Linux kernel prior to 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 6.06

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 8.04

novell linux desktop 9

opensuse opensuse 11.0

opensuse opensuse 10.3

suse suse linux enterprise server 10

suse suse linux enterprise desktop 10

debian debian linux 4.0

avaya message networking 3.1

avaya sip enablement services 4.0

avaya messaging storage server 4.0

avaya proactive contact 4.0

avaya meeting exchange 5.0

avaya expanded meet-me conferencing

avaya intuity audix lx 2.0

avaya sip enablement services -

avaya communication manager

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that resolve several security issues and fixvarious bugs are now available for Red Hat Enterprise Linux 3This update has been rated as having important security impact by the RedH ...
It was discovered that there were multiple NULL-pointer function dereferences in the Linux kernel terminal handling code A local attacker could exploit this to execute arbitrary code as root, or crash the system, leading to a denial of service (CVE-2008-2812) ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or arbitrary code execution The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6282 Dirk Nehring discovered a vulnerability in the IPsec code that allows remote users to cause a denial of service ...

References

CWE-476http://www.openwall.com/lists/oss-security/2008/07/03/2http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.10http://www.securityfocus.com/bid/30076http://secunia.com/advisories/31202http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.htmlhttp://secunia.com/advisories/31614http://www.redhat.com/support/errata/RHSA-2008-0665.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0612.htmlhttp://secunia.com/advisories/31341http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.htmlhttp://secunia.com/advisories/31229http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2008-365.htmhttp://secunia.com/advisories/31685http://secunia.com/advisories/31551http://www.debian.org/security/2008/dsa-1630http://secunia.com/advisories/31048http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlhttp://secunia.com/advisories/32759http://www.redhat.com/support/errata/RHSA-2008-0973.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.htmlhttp://secunia.com/advisories/33201http://secunia.com/advisories/32103http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.htmlhttp://www.vupen.com/english/advisories/2008/2063/referenceshttp://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.htmlhttp://secunia.com/advisories/32370http://secunia.com/advisories/30982https://exchange.xforce.ibmcloud.com/vulnerabilities/43687https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6633https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11632https://usn.ubuntu.com/637-1/http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commitdiff%3Bh=2a739dd53ad7ee010ae6e155438507f329dce788https://access.redhat.com/errata/RHSA-2008:0973https://usn.ubuntu.com/637-1/https://nvd.nist.gov