5
CVSSv2

CVE-2009-0798

Published: 24/04/2009 Updated: 29/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

ACPI Event Daemon (acpid) prior to 1.0.10 allows remote malicious users to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.

Vulnerable Product Search on Vulmon Subscribe to Product

tim hockin acpid 1.0.2

tim hockin acpid 1.0.1

tim hockin acpid

tim hockin acpid 1.0.6

tim hockin acpid 0.99.1

tim hockin acpid 0.99.0

tim hockin acpid 1.0.0

tim hockin acpid 0.99.4

tim hockin acpid 1.0.4

tim hockin acpid 1.0.3

tim hockin acpid 20010510

Vendor Advisories

Synopsis Moderate: acpid security update Type/Severity Security Advisory: Moderate Topic An updated acpid package that fixes one security issue is now availablefor Red Hat Enterprise Linux 21, 3, 4, and 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
It was discovered that acpid did not properly handle a large number of connections A local user could exploit this and monopolize CPU resources, leading to a denial of service ...
It was discovered that acpid, a daemon for delivering ACPI events, is prone to a denial of service attack by opening a large number of UNIX sockets, which are not closed properly For the stable distribution (lenny), this problem has been fixed in version 108-1lenny1 For the oldstable distribution (etch), this problem has been fixed in version 1 ...