Linux Kernel 2.4 / 2.6 (x86-64) - System Call Emulation 权限提升

admin 2023-12-12 17:11:18 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 Linux Kernel 2.4 / 2.6 (x86-64) - System Call Emulation 权限提升

CVE编号

CVE-2007-4573

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2007-09-25
漏洞描述
在2.6.22.7之前的2.6.x和Linux kernel 2.4.x中的 IA32 system call emulation功能,当在x86_64架构上运行时,在使用ptrace的32位入口路径后不会对eax寄存器进行zero extend,这可能允许本地用户通过使用%RAX寄存器触发对系统调用表的越界访问来获得权限。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://fedoranews.org/updates/FEDORA-2007-229.shtml
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35.3
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
http://lkml.org/lkml/2007/9/21/512
http://lkml.org/lkml/2007/9/21/513
http://marc.info/?l=full-disclosure&m=119062587407908&w=2
http://secunia.com/advisories/26917
http://secunia.com/advisories/26919
http://secunia.com/advisories/26934
http://secunia.com/advisories/26953
http://secunia.com/advisories/26955
http://secunia.com/advisories/26978
http://secunia.com/advisories/26994
http://secunia.com/advisories/26995
http://secunia.com/advisories/27212
http://secunia.com/advisories/27227
http://secunia.com/advisories/27912
http://secunia.com/advisories/29058
http://securitytracker.com/id?1018748
http://www.debian.org/security/2007/dsa-1378
http://www.debian.org/security/2007/dsa-1381
http://www.debian.org/security/2008/dsa-1504
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.7
http://www.mandriva.com/security/advisories?name=MDKSA-2007:195
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
http://www.mandriva.com/security/advisories?name=MDVSA-2008:008
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
http://www.redhat.com/support/errata/RHSA-2007-0936.html
http://www.redhat.com/support/errata/RHSA-2007-0937.html
http://www.redhat.com/support/errata/RHSA-2007-0938.html
http://www.securityfocus.com/archive/1/480451/100/0/threaded
http://www.securityfocus.com/archive/1/480705/100/0/threaded
http://www.securityfocus.com/bid/25774
http://www.ubuntu.com/usn/usn-518-1
http://www.vupen.com/english/advisories/2007/3246
https://issues.rpath.com/browse/RPL-1754
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00355.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 centos_5 kernel * Up to (excluding) 2.6.18-8.1.14.el5.noarch.rpm
运行在以下环境
系统 linux linux_kernel * Up to (including) 2.4.35
运行在以下环境
系统 linux linux_kernel * Up to (including) 2.6.22.6
运行在以下环境
系统 oracle_5 kernel * Up to (excluding) 1.2.6-6.el5
运行在以下环境
系统 redhat_5 kernel * Up to (excluding) 0:2.6.18-8.1.14.el5
运行在以下环境
系统 suse_10 ib-bonding-kmp-default * Up to (excluding) 0.9.0_2.6.16.60_0.69.5-1.23.2
阿里云评分 6.2
  • 攻击路径 本地
  • 攻击复杂度 容易
  • 权限要求 无需权限
  • 影响范围 越权影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 传输被破坏
  • 服务器危害 服务器失陷
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-264 权限、特权和访问控制
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0