Overview
- Description
- The procfs implementation in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was mounted with mount_procfs -o linux, which results in a NULL pointer dereference.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 1.7
- Impact score
- 2.9
- Exploitability score
- 3.1
- Vector string
- AV:L/AC:L/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28BD9F91-2384-4557-9648-25FC00D04677" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9CABFAA-594C-45D7-A0C7-795872A0C68A" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F9432E9-AACA-4242-BDAB-8792ACF72C12" } ], "operator": "OR" } ] } ]