Vulnerability CVE-2014-2851


Published: 2014-04-14   Modified: 2014-04-15

Description:
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Linux Kernel net/ping refcount issue in ping_init_sock() function
Xiaoming
12.04.2014
Med.
Linux group_info Denial Of Service
Thomas Pollet
19.04.2014

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Linux -> Linux kernel 

 References:
http://www.debian.org/security/2014/dsa-2926
http://www.openwall.com/lists/oss-security/2014/04/11/4
http://www.securityfocus.com/bid/66779
http://www.securitytracker.com/id/1030769
https://bugzilla.redhat.com/show_bug.cgi?id=1086730
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac
https://lkml.org/lkml/2014/4/10/736

Copyright 2024, cxsecurity.com

 

Back to Top