7.2
CVSSv2

CVE-2020-27786

Published: 11/12/2020 Updated: 16/05/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux 7.0

redhat enterprise linux 8.0

redhat openshift container platform 4.5

redhat openshift container platform 4.6

redhat openshift container platform 4.4

redhat enterprise mrg 2.0

netapp cloud backup -

netapp solidfire baseboard management controller -

Github Repositories

Extending research to verify n-day severity and provide exploit pocs CVE-2022-41674 - Linux kernel heap overflow by injecting Wifi Beacon frames into the 80211 stack CVE-2020-27786 - Linux kernel use-after-free in MIDI subsystem, exploit port from v4x to v5x (original exploit: githubcom/kiks7/CVE-2020-27786-Kernel-Exploit) CVE-2022-42720 - Linux kernel use-after-f

4.9 Kernel Exploit for CVE-2020-27786

CVE-2020-27786 Kernel Exploit Details You can find full details and explaination here: 1daydev/notes/Linux-Kernel-n-day-exploit-development TL;DR The vulnerability is a Race Condition that causes a write Use-After-Free The race window has been extended using the userfaultd technique handling page faults from user-space and using msg_msg to leak a kernel address and I/