Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-6282

Опубликовано: 20 нояб. 2013
Источник: nvd
CVSS3: 8.8
CVSS2: 7.2
EPSS Средний

Описание

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия до 3.2.54 (исключая)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 3.3 (включая) до 3.4.12 (исключая)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 3.5 (включая) до 3.5.5 (исключая)

EPSS

Процентиль: 99%
0.6765
Средний

8.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-20
CWE-20

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 12 лет назад

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

CVSS3: 8.8
debian
около 12 лет назад

The (1) get_user and (2) put_user API functions in the Linux kernel be ...

CVSS3: 8.8
github
больше 3 лет назад

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

EPSS

Процентиль: 99%
0.6765
Средний

8.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-20
CWE-20