Vulnerability identifier: #VU95212
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to memory corruption error within the isdn_ioctl() function in drivers/isdn/i4l/isdn_common.c. A local user can execute arbitrary code.
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=eafe1aa37e6ec2d56f14732b5240c4dd09f0613a
https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
https://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
https://lists.vmware.com/pipermail/security-announce/2008/000023.html
https://rhn.redhat.com/errata/RHSA-2008-0055.html
https://secunia.com/advisories/28626
https://secunia.com/advisories/28706
https://secunia.com/advisories/28748
https://secunia.com/advisories/28889
https://secunia.com/advisories/28971
https://secunia.com/advisories/29058
https://secunia.com/advisories/29570
https://secunia.com/advisories/30110
https://secunia.com/advisories/30962
https://secunia.com/advisories/31246
https://secunia.com/advisories/33280
https://www.debian.org/security/2008/dsa-1479
https://www.debian.org/security/2008/dsa-1503
https://www.debian.org/security/2008/dsa-1504
https://www.mandriva.com/security/advisories?name=MDVSA-2008:086
https://www.mandriva.com/security/advisories?name=MDVSA-2008:112
https://www.redhat.com/support/errata/RHSA-2008-0211.html
https://www.redhat.com/support/errata/RHSA-2008-0787.html
https://www.securityfocus.com/bid/27497
https://www.ubuntu.com/usn/usn-574-1
https://www.ubuntu.com/usn/usn-578-1
https://www.vupen.com/english/advisories/2008/2222/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10971
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.