7.8

CVE-2009-2698

Exploit

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.19
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version8.04 SwEditionlts
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
SuseLinux Enterprise Desktop Version10 Updatesp2
SuseLinux Enterprise Server Version10 Updatesp2
FedoraprojectFedora Version10
RedhatEnterprise Linux Eus Version4.8
RedhatEnterprise Linux Eus Version5.3
VMwareVcenter Server Version4.0 Update-
VMwareESXi Version4.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 23.09% 0.957
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

http://secunia.com/advisories/23073
Vendor Advisory
Broken Link
http://secunia.com/advisories/37471
Vendor Advisory
Broken Link
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/archive/1/512019/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://secunia.com/advisories/37298
Vendor Advisory
Broken Link
http://secunia.com/advisories/37105
Vendor Advisory
Broken Link
http://secunia.com/advisories/36430
Vendor Advisory
Broken Link
http://secunia.com/advisories/36510
Vendor Advisory
Broken Link
http://www.securityfocus.com/bid/36108
Patch
Third Party Advisory
Exploit
Broken Link
VDB Entry
http://www.securitytracker.com/id?1022761
Third Party Advisory
Broken Link
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=518034
Third Party Advisory
Issue Tracking