3.6
CVSSv2

CVE-2009-0835

Published: 06/03/2009 Updated: 19/03/2012
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
VMScore: 365
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and previous versions on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.25

linux linux kernel 2.6.25.10

linux linux kernel 2.6.25.3

linux linux kernel 2.6.25.4

linux linux kernel 2.6.25.5

linux linux kernel 2.6.25.6

linux linux kernel 2.6.25.12

linux linux kernel 2.6.25.11

linux linux kernel 2.6.25.9

linux linux kernel 2.6.25.1

linux linux kernel 2.6.25.2

linux linux kernel 2.6.25.7

linux linux kernel 2.6.25.8

Vendor Advisories

NFS did not correctly handle races between fcntl and interrupts A local attacker on an NFS mount could consume unlimited kernel memory, leading to a denial of service (CVE-2008-4307) ...
NFS did not correctly handle races between fcntl and interrupts A local attacker on an NFS mount could consume unlimited kernel memory, leading to a denial of service Ubuntu 810 was not affected (CVE-2008-4307) ...

Exploits

/* source: wwwsecurityfocuscom/bid/33948/info The Linux kernel is prone to a local security-bypass vulnerability A local attacker may be able to exploit this issue to bypass access control and make restricted system calls, which may result in an elevation of privileges */ /* test case for seccomp circumvention on x86-64 There ar ...