2.1
CVSSv2

CVE-2008-3272

Published: 08/08/2008 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel prior to 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.27

linux linux kernel

debian debian linux 4.0

canonical ubuntu linux 6.06

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 8.04

redhat enterprise linux desktop 4.0

redhat enterprise linux eus 4.7

redhat enterprise linux server 4.0

redhat enterprise linux workstation 4.0

Vendor Advisories

It was discovered that there were multiple NULL-pointer function dereferences in the Linux kernel terminal handling code A local attacker could exploit this to execute arbitrary code as root, or crash the system, leading to a denial of service (CVE-2008-2812) ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix various security issues and several bugsare now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Secur ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and several bugsare now available for Red Hat Enterprise MRG 10This update has been rated as having important security impact by the RedHat Secur ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that resolve several security issues and fixvarious bugs are now available for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedH ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or arbitrary code execution The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6282 Dirk Nehring discovered a vulnerability in the IPsec code that allows remote users to cause a denial of service ...

References

CWE-200http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.27-rc2http://www.securityfocus.com/bid/30559http://secunia.com/advisories/31366http://www.securitytracker.com/id?1020636http://secunia.com/advisories/31614http://www.debian.org/security/2008/dsa-1636http://secunia.com/advisories/31881http://www.redhat.com/support/errata/RHSA-2008-0885.htmlhttp://secunia.com/advisories/32023http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0857.htmlhttp://secunia.com/advisories/32190http://secunia.com/advisories/31836http://secunia.com/advisories/31551http://www.debian.org/security/2008/dsa-1630http://rhn.redhat.com/errata/RHSA-2008-0972.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlhttp://secunia.com/advisories/32799http://secunia.com/advisories/32759http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.htmlhttp://secunia.com/advisories/32103http://secunia.com/advisories/32104http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:220http://www.vupen.com/english/advisories/2008/2307http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.htmlhttp://secunia.com/advisories/32370https://exchange.xforce.ibmcloud.com/vulnerabilities/44225https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11182https://usn.ubuntu.com/637-1/http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82e68f7ffec3800425f2391c8c86277606860442https://usn.ubuntu.com/637-1/https://nvd.nist.gov