Vulnerability Description
Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.64 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://tracker.ceph.com/issues/8979Broken Link
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3ExploitVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/09/15/7ExploitMailing List
- http://www.securityfocus.com/bid/69805Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2376-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2377-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2378-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2379-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68dExploitThird Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://tracker.ceph.com/issues/8979Broken Link
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3ExploitVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/09/15/7ExploitMailing List
FAQ
What is CVE-2014-6416?
CVE-2014-6416 is a vulnerability with a CVSS score of 7.8 (HIGH). Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified...
How severe is CVE-2014-6416?
CVE-2014-6416 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6416?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux.