exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2008-0600

Status Candidate

Overview

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Related Files

sara-malware.tar.gz
Posted Feb 20, 2008
Authored by si0ux security

SARA Malware that exploits the vmsplice bug in the Linux kernel. Affects kernel versions 2.6.17 through 2.6.24.1. Successful exploitation allows the disabling of INPUT rules on the firewall, opens TCP port 1407 for execution of remote commands, and more.

tags | exploit, remote, kernel, tcp
systems | linux
advisories | CVE-2008-0600
SHA-256 | 13a1429b254b235cd35bb2ba6d42f62816ef074799e92cf199b306ba57d0309f
Debian Linux Security Advisory 1494-2
Posted Feb 13, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1494-2 - The vmsplice system call did not properly verify address arguments passed by user space processes, which allowed local attackers to overwrite arbitrary kernel memory, gaining root privileges. In the vserver-enabled kernels, a missing access check on certain symlinks in /proc enabled local attackers to access resources in other vservers.

tags | advisory, arbitrary, kernel, local, root
systems | linux, debian
advisories | CVE-2008-0010, CVE-2008-0163, CVE-2008-0600
SHA-256 | 34b719d3875c967855d387fd2b1f6c6924524020e468be586fbfcf5abcaffc62
Ubuntu Security Notice 577-1
Posted Feb 12, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 577-1 - Wojciech Purczynski discovered that the vmsplice system call did not properly perform verification of user-memory pointers. A local attacker could exploit this to overwrite arbitrary kernel memory and gain root privileges.

tags | advisory, arbitrary, kernel, local, root
systems | linux, ubuntu
advisories | CVE-2008-0600
SHA-256 | c3097de3abfb7924d2558c14687527f7f3e24c385dfac514b18b0843fe5d9eff
Mandriva Linux Security Advisory 2008-044
Posted Feb 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Various local denial of service and privilege escalation vulnerabilities have been added for the Linux 2.6 kernel package.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, mandriva
advisories | CVE-2007-5500, CVE-2007-5501, CVE-2007-6206, CVE-2008-0001, CVE-2008-0007, CVE-2008-0600
SHA-256 | 15110333a170cf683e179d93999a7af19fc080a86fb4507d86be6f743bbbae3c
Mandriva Linux Security Advisory 2008-043
Posted Feb 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in the vmsplice system call did not properly verify address arguments passed by user-space processes, which allowed local attackers to overwrite arbitrary kernel memory and gain root privileges. Mandriva urges all users to upgrade to these new kernels immediately as this flaw is being actively exploited. This issue only affects 2.6.17 and newer Linux kernels, so neither Corporate 3.0 nor Corporate 4.0 are affected.

tags | advisory, arbitrary, kernel, local, root
systems | linux, mandriva
advisories | CVE-2008-0600
SHA-256 | 9bd3bb51b8241006cbb0fe04e1276bc890793ba7fce3fc86bc75440386aace87
Debian Linux Security Advisory 1494-1
Posted Feb 11, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1494-1 - The vmsplice system call did not properly verify address arguments passed by user space processes, which allowed local attackers to overwrite arbitrary kernel memory, gaining root privileges. In the vserver-enabled kernels, a missing access check on certain symlinks in /proc enabled local attackers to access resources in other vservers.

tags | advisory, arbitrary, kernel, local, root
systems | linux, debian
advisories | CVE-2008-0010, CVE-2008-0600, CVE-2008-0163
SHA-256 | dca93886f4927b2832e7fab1161ee721a75920d9083dc86b3ed21e246e5cb727
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close