Vulnerability Description
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.17 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://marc.info/?l=linux-kernel&m=120263652322197&w=2Exploit
- http://marc.info/?l=linux-kernel&m=120264520431307&w=2Exploit
- http://marc.info/?l=linux-kernel&m=120264773202422&w=2Exploit
- http://marc.info/?l=linux-kernel&m=120266328220808&w=2Exploit
- http://marc.info/?l=linux-kernel&m=120266353621139&w=2Exploit
- http://secunia.com/advisories/28835
- http://secunia.com/advisories/28858
- http://secunia.com/advisories/28875
- http://secunia.com/advisories/28889
- http://secunia.com/advisories/28896
- http://secunia.com/advisories/28912
- http://secunia.com/advisories/28925
FAQ
What is CVE-2008-0600?
CVE-2008-0600 is a vulnerability with a CVSS score of 7.2 (HIGH). The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arg...
How severe is CVE-2008-0600?
CVE-2008-0600 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0600?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.