CVE-2009-1185
Published Apr 17, 2009
Last updated 2 years ago
Overview
- Description
- udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-346
Vendor comments
- Red HatThis issue has been fixed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2009-0427.html . udev packages as shipped in Red Hat Enterprise Linux 4 were not affected by this flaw, as they do not use netlink sockets for communication. udev is not shipped in Red Hat Enterprise Linux 2.1 and 3.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:udev_project:udev:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F3E9D80-7648-4B88-AD14-EB45BF4A4284", "versionEndExcluding": "141" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E135846-8959-4D7E-A8E6-07F0EC15F010" }, { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C76D0C17-2AFF-4209-BBCD-36166DF7F974" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC6C1408-671A-4436-A825-12170CFB5C9A" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" }, { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2953793-3D79-4128-A841-EDAF50095FF6", "versionEndExcluding": "7.1" }, { "criteria": "cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6B30D89-FF23-4818-A63D-7DE5C3328165" }, { "criteria": "cpe:2.3:a:juniper:ctpview:7.1:r1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FC90E91-36BB-458E-9E63-B35DB0FF8666" }, { "criteria": "cpe:2.3:a:juniper:ctpview:7.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79A6AAEE-464C-424D-9738-174CDB70FAB9" } ], "operator": "OR" } ] } ]