CVE-2008-3247
Published Jul 24, 2008
Last updated a year ago
Overview
- Description
- The LDT implementation in the Linux kernel 2.6.25.x before 2.6.25.11 on x86_64 platforms uses an incorrect size for ldt_desc, which allows local users to cause a denial of service (system crash) or possibly gain privileges via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5 or Red Hat Enterprise MRG.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7C4DFF-616C-497D-9BAB-67C2E21BC21D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6EBBFE8-2332-45CE-93F8-6815C2AE5D17" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "388414A1-C9B4-41BA-AD35-6501A463A095" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDBA01DD-C129-48F1-800B-838418F4A4A4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "185F1EF8-04EB-43ED-B909-8BDF60F23E76" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3483FAFA-353C-498F-AF68-8F5B84A0F30D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B11A9E1-9D90-46DC-81B5-17A137205AB3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07EEC559-9240-46BE-9057-0F17D1F61F99" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBBC127F-D67E-43FE-BCFE-606C200084F4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42B18945-EE09-4E6B-8C11-E382E5F8F850" } ], "operator": "OR" } ] } ]