2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-4410" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-12-24T16:30:00.313" ,
"lastModified" : "2012-03-19T04:00:00.000" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The fuse_ioctl_copy_user function in the ioctl handler in fs/fuse/file.c in the Linux kernel 2.6.29-rc1 through 2.6.30.y uses the wrong variable in an argument to the kunmap function, which allows local users to cause a denial of service (panic) via unknown vectors."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n fuse_ioctl_copy_user el manejador ioctl en fs/fuse/file.c en el kernel de Linux v2.6.29-rc1 hasta v2.6.30.y usa la variable incorrecta en un argumento en la funci\u00f3n kunmap, lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (p\u00e1nico) a trv\u00e9s de vectores desconocidos."
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Not vulnerable. This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit 59efec7b that introduced the problem." ,
"lastModified" : "2009-12-31T00:00:00"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:C" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 4.9
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C386B13F-9D7C-45F8-B86A-886384144A8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*" ,
"matchCriteriaId" : "32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D48FD9D7-E775-4E26-AEBF-01A09C404D6B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "89EA3CF3-0AB7-4648-96BA-25E978D2C8C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*" ,
"matchCriteriaId" : "3E4DB179-F78F-4D36-A47D-557FB1B945DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*" ,
"matchCriteriaId" : "23859759-4748-4A03-9D78-083C77CFF4AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04BCABEB-DE2A-4C85-BFD5-7A1318479ECA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A67A63E8-837E-4162-999E-3B3DAAE57C96"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A701E87D-B807-426E-9CD4-6721DBCABE19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66F6E506-EC0A-4784-BDA3-B7B5CD938B92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DBFA0277-B491-4BB1-88DC-85362F0A689C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE922924-6496-4D24-94A6-8EDD431A4568"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D5FC0A9-A78A-4D09-BDCC-208AFC899824"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DBFC9DD-B7C2-4FB2-A8F6-29FF50EFAAE5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54B3BFC1-4B0A-4D63-BFA2-CF6A51A8D2F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10E55450-F6D9-483C-9CC8-E651E5A12AB1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "45273823-29EA-44DE-8444-3933402C5793"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "88F60E74-09DB-4D4A-B922-4A46EED0EC20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "E242D3DE-D1DC-406A-BCC3-C4380B7EC369"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*" ,
"matchCriteriaId" : "06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*" ,
"matchCriteriaId" : "8598D6E5-0C5C-4A31-841A-C12801DB7D91"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*" ,
"matchCriteriaId" : "59800B0A-477B-42F8-A58A-5144F455AE01"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*" ,
"matchCriteriaId" : "F166BF6B-BFB0-4206-BD59-179701572F1C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC40B6DE-09D9-422B-965B-7EB9F6661DEB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91170B40-4D25-4E40-8F0B-DBC1AE217F99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E28B8B9-B832-4D77-BE1A-BB5D8A678678"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "468745AA-0BE5-4B22-91FA-2FD350BD2F64"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF208118-3534-47E5-9943-83EF165F1249"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "427E3009-A2F2-4ED2-8D1A-14938F639D2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.30.y:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "340C606B-EAA7-4D44-B811-16A34863D2AE"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/61335" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/37928" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.openwall.com/lists/oss-security/2009/12/23/1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/37453" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=549400" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01344.html" ,
"source" : "cve@mitre.org"
}
]
}