6.9

CVE-2014-0205

Exploit

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.36.4
LinuxLinux Kernel Version2.6.36
LinuxLinux Kernel Version2.6.36 Updaterc1
LinuxLinux Kernel Version2.6.36 Updaterc2
LinuxLinux Kernel Version2.6.36 Updaterc3
LinuxLinux Kernel Version2.6.36 Updaterc4
LinuxLinux Kernel Version2.6.36 Updaterc5
LinuxLinux Kernel Version2.6.36 Updaterc6
LinuxLinux Kernel Version2.6.36 Updaterc7
LinuxLinux Kernel Version2.6.36 Updaterc8
LinuxLinux Kernel Version2.6.36.1
LinuxLinux Kernel Version2.6.36.2
LinuxLinux Kernel Version2.6.36.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.093
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.