Vulnerability Description
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Niels Provos | Systrace | <= 1.6e |
| Linux | Linux Kernel | _nil_ |
Related Weaknesses (CWE)
References
- http://scary.beasts.org/security/CESA-2009-001.htmlExploit
- http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html
- http://www.citi.umich.edu/u/provos/systrace/
- http://www.securityfocus.com/archive/1/500377/100/0/threaded
- http://www.securityfocus.com/bid/33417Exploit
- http://scary.beasts.org/security/CESA-2009-001.htmlExploit
- http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html
- http://www.citi.umich.edu/u/provos/systrace/
- http://www.securityfocus.com/archive/1/500377/100/0/threaded
- http://www.securityfocus.com/bid/33417Exploit
FAQ
What is CVE-2009-0343?
CVE-2009-0343 is a vulnerability with a CVSS score of 7.2 (HIGH). Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a pol...
How severe is CVE-2009-0343?
CVE-2009-0343 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0343?
Check the references section above for vendor advisories and patch information. Affected products include: Niels Provos Systrace, Linux Linux Kernel.