7

CVE-2009-3547

Exploit

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.31.14
LinuxLinux Kernel Version2.6.32 Update-
LinuxLinux Kernel Version2.6.32 Updaterc1
LinuxLinux Kernel Version2.6.32 Updaterc2
LinuxLinux Kernel Version2.6.32 Updaterc3
LinuxLinux Kernel Version2.6.32 Updaterc4
LinuxLinux Kernel Version2.6.32 Updaterc5
NovellLinux Desktop Version9
OpensuseOpensuse Version11.0
OpensuseOpensuse Version11.2
SuseSuse Linux Enterprise Desktop Version10 Updatesp2
SuseSuse Linux Enterprise Server Version10 Updatesp2
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
FedoraprojectFedora Version10
VMwareVma Version4.0
VMwareEsx Version4.0
RedhatMrg Realtime Version1.0
RedhatEnterprise Linux Eus Version4.8
RedhatEnterprise Linux Eus Version5.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.44% 0.871
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

CWE-672 Operation on a Resource after Expiration or Release

The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

http://www.securityfocus.com/archive/1/512019/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/36901
Third Party Advisory
Exploit
Broken Link
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=530490
Patch
Third Party Advisory
Issue Tracking