4.7
CVSSv2

CVE-2009-1046

Published: 23/03/2009 Updated: 31/05/2016
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 475
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The console selection feature in the Linux kernel 2.6.28 prior to 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate malicious users to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.28

linux linux kernel 2.6.28.1

linux linux kernel 2.6.28.2

linux linux kernel 2.6.28.3

linux linux kernel 2.6.25

Vendor Advisories

NFS did not correctly handle races between fcntl and interrupts A local attacker on an NFS mount could consume unlimited kernel memory, leading to a denial of service Ubuntu 810 was not affected (CVE-2008-4307) ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-4307 Bryn M Reeves reported a denial of service in the NFS filesystem Local users can trigger a kernel BUG() due to a r ...

Exploits

/* CVE-2009-1046 Virtual Console UTF-8 set_selection() off-by-one(two) Memory Corruption * Linux Kernel <= 26283 * * coded by: sgrakkyu <at> antiforkorg * kernelbofblogspotcom/2009/07/even-when-one-byte-mattershtml * * Dedicated to all people talking nonsense about non exploitability of kernel heap off-by-one overflow ...