Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-0600

Опубликовано: 09 фев. 2008
Источник: redhat
CVSS2: 7.2
EPSS Низкий

Описание

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Отчет

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.

Дополнительная информация

Статус:

Important
Дефект:
CWE-119

EPSS

Процентиль: 63%
0.00465
Низкий

7.2 High

CVSS2

Связанные уязвимости

ubuntu
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

nvd
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

debian
больше 17 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 ...

github
около 3 лет назад

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

oracle-oval
больше 17 лет назад

ELSA-2008-0129: Important: kernel security update (IMPORTANT)

EPSS

Процентиль: 63%
0.00465
Низкий

7.2 High

CVSS2