7.2
CVSSv2

CVE-2009-1185

Published: 17/04/2009 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 736
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

udev prior to 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

udev project udev

opensuse opensuse 11.1

opensuse opensuse 11.0

opensuse opensuse 10.3

suse linux enterprise server 10

suse linux enterprise desktop 10

suse linux enterprise server 11

suse linux enterprise desktop 11

suse linux enterprise debuginfo 10

suse linux enterprise debuginfo 11

debian debian linux 5.0

debian debian linux 4.0

canonical ubuntu linux 7.10

canonical ubuntu linux 8.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

fedoraproject fedora 10

fedoraproject fedora 9

juniper ctpview

juniper ctpview 7.1

juniper ctpview 7.2

Vendor Advisories

Synopsis Important: udev security update Type/Severity Security Advisory: Important Topic Updated udev packages that fix one security issue are now available for RedHat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team Descriptio ...
Sebastian Krahmer discovered that udev did not correctly validate netlink message senders A local attacker could send specially crafted messages to udev in order to gain root privileges (CVE-2009-1185) ...
Sebastian Kramer discovered two vulnerabilities in udev, the /dev and hotplug management daemon CVE-2009-1185 udev does not check the origin of NETLINK messages, allowing local users to gain root privileges CVE-2009-1186 udev suffers from a buffer overflow condition in path encoding, potentially allowing arbitrary code execution ...

Exploits

Linux 26 kernel udev versions below 141 local privilege escalation exploit ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'rex' require 'msf/core/post/common' require 'msf/core/post/file' require 'msf/core/ ...
#!/bin/sh # Linux 26 # bug found by Sebastian Krahmer # # lame sploit using LD technique # by kcope in 2009 # tested on debian-etch,ubuntu,gentoo # do a 'cat /proc/net/netlink' # and set the first arg to this # script to the pid of the netlink socket # (the pid is udevd_pid - 1 most of the time) # + sploit has to be UNIX formatted text :) # + if ...
/* * cve-2009-1185c * * udev < 141 Local Privilege Escalation Exploit * Jon Oberheide <jon@oberheideorg> * jonoberheideorg * * Information: * * cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2009-1185 * * udev before 141 does not verify whether a NETLINK message originates * from kernel space, which allow ...

Github Repositories

Simple Metasploitable2 RootKit A condensed, single file rootkit (uploadphp) used to establish persistance within a Metasploitable2 machine How to Use uploadphp Navigate to the File Upload section of DVWA (<ms2 ipaddr>/dvwa/vulnerabilities/upload/) and upload the file as uploadphpjpeg This will subvert the filetype filter Send an HTTP request to the

SoftwareSec-Metasploitable2 Overview Attempt to get a shell onto a remote system (Metasploitable2) and extract its password and shadow files for password cracking Using SSH to verify results Set Ups Virtual Box Set up a local nat network File > Preferences > Network > add Nat Network Kali Settings > Network > Attach to > Nat Network u

Hack the Box Ethical Hacking - Lame the targeted machine is Lame nmap First thing first, we run a quick initial nmap scan to see whihc ports are open and which services are running on those ports Run nmap to scan the machin nmap -vvv -n -Pn -p0-65535 -oG allPolrs 10129114132 # Nmap 792 scan initiated Sat Apr 9 05:28:51 2022 as: nmap -vvv -n -Pn -p0-65535 -oG allPolrs 1

References

CWE-346http://secunia.com/advisories/34731https://bugzilla.redhat.com/show_bug.cgi?id=495051http://www.securityfocus.com/bid/34536https://launchpad.net/bugs/cve/2009-1185http://www.ubuntu.com/usn/usn-758-1http://secunia.com/advisories/34753http://secunia.com/advisories/34750http://www.debian.org/security/2009/dsa-1772http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.446399http://www.vupen.com/english/advisories/2009/1053http://www.securitytracker.com/id?1022067http://www.gentoo.org/security/en/glsa/glsa-200904-18.xmlhttp://secunia.com/advisories/34785http://secunia.com/advisories/34771https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00462.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00463.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.htmlhttp://wiki.rpath.com/Advisories:rPSA-2009-0063http://secunia.com/advisories/34801http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.htmlhttp://secunia.com/advisories/34787http://www.mandriva.com/security/advisories?name=MDVSA-2009:104http://www.mandriva.com/security/advisories?name=MDVSA-2009:103http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0063http://secunia.com/advisories/34776http://www.redhat.com/support/errata/RHSA-2009-0427.htmlhttp://www.vmware.com/security/advisories/VMSA-2009-0009.htmlhttp://www.vupen.com/english/advisories/2009/1865http://lists.vmware.com/pipermail/security-announce/2009/000060.htmlhttp://secunia.com/advisories/35766http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705https://www.exploit-db.com/exploits/8572https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5975https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10925http://www.securityfocus.com/archive/1/504849/100/0/threadedhttp://www.securityfocus.com/archive/1/502752/100/0/threadedhttp://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e2b362d9f23d4c63018709ab5f81a02f72b91e75http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e86a923d508c2aed371cdd958ce82489cf2ab615https://access.redhat.com/errata/RHSA-2009:0427https://usn.ubuntu.com/758-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/21848/