Vulnerability Description
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.59 |
| Debian | Debian Linux | 6.0 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Enterprise Linux Eus | 6.3 |
| Redhat | Enterprise Linux Server Eus | 6.3 |
| Suse | Suse Linux Enterprise Desktop | 11 |
| Suse | Suse Linux Enterprise High Availability Extension | 11 |
| Suse | Suse Linux Enterprise Server | 11 |
| Oracle | Linux | 6 |
| Canonical | Ubuntu Linux | 10.04 |
| F5 | Big-Ip Access Policy Manager | >= 11.1.0, <= 11.5.1 |
| F5 | Big-Ip Advanced Firewall Manager | >= 11.3.0, <= 11.5.1 |
| F5 | Big-Ip Analytics | >= 11.1.0, <= 11.5.1 |
| F5 | Big-Ip Application Acceleration Manager | >= 11.4.0, <= 11.5.1 |
| F5 | Big-Ip Application Security Manager | >= 11.1.0, <= 11.5.1 |
| F5 | Big-Ip Edge Gateway | >= 11.1.0, <= 11.3.0 |
| F5 | Big-Ip Global Traffic Manager | >= 11.1.0, <= 11.5.1 |
| F5 | Big-Ip Link Controller | >= 11.1.0, <= 11.5.1 |
| F5 | Big-Ip Local Traffic Manager | >= 11.1.0, <= 11.5.1 |
| F5 | Big-Ip Policy Enforcement Manager | >= 11.3.0, <= 11.5.1 |
Related Weaknesses (CWE)
References
- http://bugzilla.novell.com/show_bug.cgi?id=875690Issue TrackingPermissions RequiredThird Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken Link
- http://linux.oracle.com/errata/ELSA-2014-0771.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.htmlMailing ListThird Party Advisory
- http://pastebin.com/raw.php?i=yTSFUBgZExploitMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0512.htmlThird Party Advisory
- http://secunia.com/advisories/59218Not Applicable
- http://secunia.com/advisories/59262Broken Link
- http://secunia.com/advisories/59599Broken Link
- http://source.android.com/security/bulletin/2016-07-01.htmlNot Applicable
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.htmlThird Party Advisory
- http://www.debian.org/security/2014/dsa-2926Third Party Advisory
- http://www.debian.org/security/2014/dsa-2928Third Party Advisory
- http://www.exploit-db.com/exploits/33516ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2014-0196?
CVE-2014-0196 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial o...
How severe is CVE-2014-0196?
CVE-2014-0196 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0196?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Redhat Enterprise Linux, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server Eus.