exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2008-0600

Status Candidate

Overview

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Related Files

sara-malware.tar.gz
Posted Feb 20, 2008
Authored by si0ux security

SARA Malware that exploits the vmsplice bug in the Linux kernel. Affects kernel versions 2.6.17 through 2.6.24.1. Successful exploitation allows the disabling of INPUT rules on the firewall, opens TCP port 1407 for execution of remote commands, and more.

tags | exploit, remote, kernel, tcp
systems | linux
advisories | CVE-2008-0600
SHA-256 | 13a1429b254b235cd35bb2ba6d42f62816ef074799e92cf199b306ba57d0309f
Debian Linux Security Advisory 1494-2
Posted Feb 13, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1494-2 - The vmsplice system call did not properly verify address arguments passed by user space processes, which allowed local attackers to overwrite arbitrary kernel memory, gaining root privileges. In the vserver-enabled kernels, a missing access check on certain symlinks in /proc enabled local attackers to access resources in other vservers.

tags | advisory, arbitrary, kernel, local, root
systems | linux, debian
advisories | CVE-2008-0010, CVE-2008-0163, CVE-2008-0600
SHA-256 | 34b719d3875c967855d387fd2b1f6c6924524020e468be586fbfcf5abcaffc62
Ubuntu Security Notice 577-1
Posted Feb 12, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 577-1 - Wojciech Purczynski discovered that the vmsplice system call did not properly perform verification of user-memory pointers. A local attacker could exploit this to overwrite arbitrary kernel memory and gain root privileges.

tags | advisory, arbitrary, kernel, local, root
systems | linux, ubuntu
advisories | CVE-2008-0600
SHA-256 | c3097de3abfb7924d2558c14687527f7f3e24c385dfac514b18b0843fe5d9eff
Mandriva Linux Security Advisory 2008-044
Posted Feb 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Various local denial of service and privilege escalation vulnerabilities have been added for the Linux 2.6 kernel package.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, mandriva
advisories | CVE-2007-5500, CVE-2007-5501, CVE-2007-6206, CVE-2008-0001, CVE-2008-0007, CVE-2008-0600
SHA-256 | 15110333a170cf683e179d93999a7af19fc080a86fb4507d86be6f743bbbae3c
Mandriva Linux Security Advisory 2008-043
Posted Feb 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in the vmsplice system call did not properly verify address arguments passed by user-space processes, which allowed local attackers to overwrite arbitrary kernel memory and gain root privileges. Mandriva urges all users to upgrade to these new kernels immediately as this flaw is being actively exploited. This issue only affects 2.6.17 and newer Linux kernels, so neither Corporate 3.0 nor Corporate 4.0 are affected.

tags | advisory, arbitrary, kernel, local, root
systems | linux, mandriva
advisories | CVE-2008-0600
SHA-256 | 9bd3bb51b8241006cbb0fe04e1276bc890793ba7fce3fc86bc75440386aace87
Debian Linux Security Advisory 1494-1
Posted Feb 11, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1494-1 - The vmsplice system call did not properly verify address arguments passed by user space processes, which allowed local attackers to overwrite arbitrary kernel memory, gaining root privileges. In the vserver-enabled kernels, a missing access check on certain symlinks in /proc enabled local attackers to access resources in other vservers.

tags | advisory, arbitrary, kernel, local, root
systems | linux, debian
advisories | CVE-2008-0010, CVE-2008-0600, CVE-2008-0163
SHA-256 | dca93886f4927b2832e7fab1161ee721a75920d9083dc86b3ed21e246e5cb727
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close