7.2
CVSSv2

CVE-2013-2094

Published: 14/05/2013 Updated: 04/03/2024
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 736
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The perf_swevent_init function in kernel/events/core.c in the Linux kernel prior to 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-0160 vladz reported a timing leak with the /dev/ptmx character device A local user could use this to d ...
The perf_swevent_init function in kernel/events/corec in the Linux kernel before 389 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call ...
The system could be made to run programs as an administrator ...
Several security issues were fixed in the kernel ...
The system could be made to run programs as an administrator ...
Several security issues were fixed in the kernel ...
The system could be made to run programs as an administrator ...
The system could be made to run programs as an administrator ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The perf_swevent_init function in kernel/events/corec in the Linux kernel before 389 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call ...

Exploits

/* * linux 2637-3xx x86_64, ~100 LOC * gcc-46 -O2 semtexc && /aout * 2010 sd@fucksheeporg, salut! * * update may 2013: * seems like centos 2632 backported the perf bug, lol * jewgold to 115T6jzGrVMgQ2Nt1Wnua7Ch1EuL9WXT2g if you insist * * EDB Note: Update ~ timetobleedcom/a-closer-look-at-a-recent-privilege-es ...
/* * CVE-2013-2094 exploit x86_64 Linux < 389 * by sorbo (sorbo@darkircoporg) June 2013 * * Based on sd's exploit Supports more targets * */ #define _GNU_SOURCE #include <stringh> #include <stdioh> #include <unistdh> #include <stdlibh> #include <stdinth> #include <sys/syscallh> #include < ...
/** * Ubuntu 1204 3x x86_64 perf_swevent_init Local root exploit * by Vitaly Nikolenko (vnik5287@gmailcom) * * based on semtexc by sd * * Supported targets: * [0] Ubuntu 12040 - 320-23-generic * [1] Ubuntu 12041 - 320-29-generic * [2] Ubuntu 12042 - 350-23-generic * * $ gcc vnikc -O2 -o vnik * * $ uname -r * 320-23 ...
perf_swevent_init local root exploit for the Linux kernel versions prior to 389 for x86_64 Based off of sd's exploit ...
This is a ROP exploit variant of the perf_swevent_init local root exploit for the Linux kernel versions prior to 389 for x86_64 ...

Github Repositories

original cve-2013-2094 exploit and a rewritten version for educational purposes

CVE-2013-2094 code for¶ ↑ timetobleedcom/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/ How to build¶ ↑ You need to build the C file of your choice like this: gcc -O2 file-namec -O2 is required due to how the exploit actually works (see the blog post for more information) Why¶ ↑ I thought the original exploit w

CVE-2013-2094 Linux 2.6.32/2.6.37 - 3.8.10 PERF_EVENTS local root x86/x86_64

CVE-2013-2094 Linux 2632/2637 - 3810 PERF_EVENTS local root x86/x86_64 without backconnect

CVE-2013-2094 Mitigation Fix This script provides an easy mechnism for generating portable SystemTap modules that can be loaded with systemtap-runtime to mitigate the vulnerability described in CVE-2013-2094 This toolset is aimed towards RHEL6, but will likely work without modification on other Enterprise Linux based distros Instructions Ensure you have the debuginfo reposito

References

CWE-189http://twitter.com/djrbliss/statuses/334301992648331267http://news.ycombinator.com/item?id=5703758https://bugzilla.redhat.com/show_bug.cgi?id=962792http://www.reddit.com/r/netsec/comments/1eb9iwhttp://www.openwall.com/lists/oss-security/2013/05/14/6http://packetstormsecurity.com/files/121616/semtex.chttps://github.com/torvalds/linux/commit/8176cced706b5e5d15887584150764894e94e02fhttp://lkml.indiana.edu/hypermail/linux/kernel/1304.1/03976.htmlhttp://lkml.indiana.edu/hypermail/linux/kernel/1304.1/04302.htmlhttp://lkml.indiana.edu/hypermail/linux/kernel/1304.1/03652.htmlhttp://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9http://www.ubuntu.com/usn/USN-1828-1http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00008.htmlhttp://www.ubuntu.com/usn/USN-1827-1http://rhn.redhat.com/errata/RHSA-2013-0830.htmlhttp://www.ubuntu.com/usn/USN-1826-1http://lists.centos.org/pipermail/centos-announce/2013-May/019729.htmlhttp://www.ubuntu.com/usn/USN-1825-1http://lists.centos.org/pipermail/centos-announce/2013-May/019733.htmlhttp://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.htmlhttp://www.ubuntu.com/usn/USN-1836-1http://www.ubuntu.com/usn/USN-1838-1http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2013-06/msg00009.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:176http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00017.htmlhttp://www.osvdb.org/93361http://www.exploit-db.com/exploits/33589http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8176cced706b5e5d15887584150764894e94e02fhttps://nvd.nist.govhttps://www.debian.org/security/./dsa-2669https://github.com/realtalk/cve-2013-2094https://www.exploit-db.com/exploits/25444/https://access.redhat.com/security/cve/cve-2013-2094https://www.kb.cert.org/vuls/id/774103