5.5

CVE-2008-3275

Exploit

The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.25.15
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version7.04
CanonicalUbuntu Linux Version7.10
CanonicalUbuntu Linux Version8.04 SwEditionlts
SuseSuse Linux Enterprise Desktop Version10 Updatesp1
SuseSuse Linux Enterprise Server Version10 Updatesp1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.201
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

https://usn.ubuntu.com/637-1/
Third Party Advisory
http://lkml.org/lkml/2008/7/2/83
Third Party Advisory
Exploit
Mailing List
http://www.securityfocus.com/bid/30647
Patch
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020739
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=457858
Patch
Third Party Advisory
Issue Tracking