CVE-2008-5701
Published Dec 22, 2008
Last updated a year ago
Overview
- Description
- Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.7
- Impact score
- 6.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5 or Red Hat Enterprise MRG. Red Hat does not provide support for the Linux kernel on the MIPS architecture.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B5B312F-E76A-43E1-A73F-31535848D55B", "versionEndIncluding": "2.6.28" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3463B83B-E46F-456E-98BA-801C59AEB337" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05FD0767-03F3-416C-AB6D-6BC4A12220B0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8452D554-8DEB-4265-839C-6B40CCFB56B5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94F445F9-57A5-4453-BB5D-290349C04A80" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62C97D20-4152-47C4-B21B-8206CF49E20A" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" } ], "operator": "OR" } ] } ]