Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2009-2692


The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.


Published

2009-08-14T15:16:27.500

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-908

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 2.4.37.5 Yes
Operating System linux linux_kernel < 2.6.30.5 Yes
Operating System debian debian_linux 4.0 Yes
Operating System suse linux_enterprise_real_time 10 Yes
Operating System redhat enterprise_linux_desktop 4.0 Yes
Operating System redhat enterprise_linux_desktop 5.0 Yes
Operating System redhat enterprise_linux_eus 4.8 Yes
Operating System redhat enterprise_linux_eus 5.3 Yes
Operating System redhat enterprise_linux_server 4.0 Yes
Operating System redhat enterprise_linux_server 5.0 Yes
Operating System redhat enterprise_linux_server_aus 5.3 Yes
Operating System redhat enterprise_linux_workstation 4.0 Yes
Operating System redhat enterprise_linux_workstation 5.0 Yes

References