7.8
CVSSv2

CVE-2008-5025

Published: 17/11/2008 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Stack-based buffer overflow in the hfs_cat_find_brec function in fs/hfs/catalog.c in the Linux kernel prior to 2.6.28-rc1 allows malicious users to cause a denial of service (memory corruption or system crash) via an hfs filesystem image with an invalid catalog namelength field, a related issue to CVE-2008-4933.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.25.4

linux linux kernel 2.6.25.11

linux linux kernel 2.6.18

linux linux kernel 2.6.25.9

linux linux kernel 2.6.22.15

linux linux kernel 2.6.24.7

linux linux kernel 2.6.23.13

linux linux kernel 2.6.24.2

linux linux kernel 2.4.36.6

linux linux kernel 2.6.26.5

linux linux kernel

linux linux kernel 2.6.22.21

linux linux kernel 2.6.25.12

linux linux kernel 2.6.25.5

linux linux kernel 2.6.23.8

linux linux kernel 2.6.25

linux linux kernel 2.6.22.12

linux linux kernel 2.6.25.8

linux linux kernel 2.6.21.6

linux linux kernel 2.4.36.2

linux linux kernel 2.6.22.1

linux linux kernel 2.6.23.16

linux linux kernel 2.6.24.1

linux linux kernel 2.6.25.6

linux linux kernel 2.6.22

linux linux kernel 2.6.26

linux linux kernel 2.6.26.3

linux linux kernel 2.6.20.16

linux linux kernel 2.6.27

linux linux kernel 2.6.19.4

linux linux kernel 2.6.25.13

linux linux kernel 2.6.20.21

linux linux kernel 2.6.25.7

linux linux kernel 2.4.36.1

linux linux kernel 2.6.25.3

linux linux kernel 2.6.24

linux linux kernel 2.6.26.2

linux linux kernel 2.6.20.17

linux linux kernel 2.6.21.5

linux linux kernel 2.6.25.15

linux linux kernel 2.6.24_rc4

linux linux kernel 2.6.23.15

linux linux kernel 2.6.23.10

linux linux kernel 2.4.36.4

linux linux kernel 2.6.26.1

linux linux kernel 2.6.20.20

linux linux kernel 2.6.22.18

linux linux kernel 2.4.36.3

linux linux kernel 2.6.22.20

linux linux kernel 2.6.20.18

linux linux kernel 2.6.23.9

linux linux kernel 2.6.25.2

linux linux kernel 2.6.25.1

linux linux kernel 2.6.24.4

linux linux kernel 2.6.25.16

linux linux kernel 2.6.22.9

linux linux kernel 2.6.25.17

linux linux kernel 2.6.22.13

linux linux kernel 2.6.19.7

linux linux kernel 2.6.24.5

linux linux kernel 2.6.24_rc1

linux linux kernel 2.6.20.19

linux linux kernel 2.6.22.17

linux linux kernel 2.6.25.10

linux linux kernel 2.6.22.11

linux linux kernel 2.6.23

linux linux kernel 2.6.22.10

linux linux kernel 2.6.23.17

linux linux kernel 2.6.21.7

linux linux kernel 2.6.23_rc1

linux linux kernel 2.6.22.22

linux linux kernel 2.6.24.6

linux linux kernel 2.6.22_rc7

linux linux kernel 2.4.36

linux linux kernel 2.6.23.12

linux linux kernel 2.6.24_rc5

linux linux kernel 2.6.19.6

linux linux kernel 2.6.22.8

linux linux kernel 2.6.19.5

linux linux kernel 2.4.36.5

linux linux kernel 2.6.22.2

linux linux kernel 2.2.27

linux linux kernel 2.6.22.19

linux linux kernel 2.6.24.3

linux linux kernel 2.6.22_rc1

linux linux kernel 2.6.25.14

linux linux kernel 2.6.26.4

linux linux kernel 2.6.23.11

linux linux kernel 2.6.22.14

linux linux kernel 2.6

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that resolve several security issues and fixvarious bugs are now available for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedH ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that resolve several security issues are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team ...
It was discovered that the Xen hypervisor block driver did not correctly validate requests A user with root privileges in a guest OS could make a malicious IO request with a large number of blocks that would crash the host OS, leading to a denial of service This only affected Ubuntu 710 (CVE-2007-5498) ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-3527 Tavis Ormandy reported a local DoS and potential privilege escalation in the Virtual Dynamic Shared Objects (vDSO) ...

References

CWE-119http://openwall.com/lists/oss-security/2008/11/10/1http://openwall.com/lists/oss-security/2008/11/10/6http://openwall.com/lists/oss-security/2008/11/11/12http://openwall.com/lists/oss-security/2008/11/11/1https://bugzilla.redhat.com/show_bug.cgi?id=470769http://openwall.com/lists/oss-security/2008/11/10/3http://openwall.com/lists/oss-security/2008/11/10/7http://secunia.com/advisories/32918http://www.mandriva.com/security/advisories?name=MDVSA-2008:246http://www.debian.org/security/2008/dsa-1687http://secunia.com/advisories/33180http://www.debian.org/security/2008/dsa-1681http://secunia.com/advisories/32998http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.htmlhttp://secunia.com/advisories/33704http://secunia.com/advisories/33641http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.htmlhttp://www.redhat.com/support/errata/RHSA-2009-0014.htmlhttp://secunia.com/advisories/33556http://rhn.redhat.com/errata/RHSA-2009-0264.htmlhttp://secunia.com/advisories/33858http://secunia.com/advisories/32719http://www.securityfocus.com/bid/32289http://osvdb.org/49863http://www.securitytracker.com/id?1021230http://www.ubuntu.com/usn/usn-679-1https://exchange.xforce.ibmcloud.com/vulnerabilities/46605https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10470http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=d38b7aa7fc3371b52d036748028db50b585ade2ehttps://access.redhat.com/errata/RHSA-2009:0014https://nvd.nist.govhttps://usn.ubuntu.com/679-1/