中危 Linux kernel 'n_tty.c'内存破坏漏洞
CVE编号
CVE-2014-0196利用情况
POC 已公开补丁情况
官方补丁披露时间
2014-05-07漏洞描述
Linux Kernel是一款开源的操作系统。 Linux kernel 'n_tty.c'存在内存破坏漏洞,允许本地用户通过触发种族条件涉及读取和写入操作与长字符串导致拒绝服务或获取权限。解决建议
用户可以联系供应商获得补丁信息:https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | f5 | big-ip_access_policy_manager | * | From (including) 11.1.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_advanced_firewall_manager | * | From (including) 11.3.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_analytics | * | From (including) 11.1.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_application_acceleration_manager | * | From (including) 11.4.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_application_security_manager | * | From (including) 11.1.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_edge_gateway | * | From (including) 11.1.0 | Up to (including) 11.3.0 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_global_traffic_manager | * | From (including) 11.1.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_link_controller | * | From (including) 11.1.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_local_traffic_manager | * | From (including) 11.1.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_policy_enforcement_manager | * | From (including) 11.3.0 | Up to (including) 11.5.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_protocol_security_module | * | From (including) 11.1.0 | Up to (including) 11.4.1 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_wan_optimization_manager | * | From (including) 11.1.0 | Up to (including) 11.3.0 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-ip_webaccelerator | * | From (including) 11.1.0 | Up to (including) 11.3.0 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-iq_application_delivery_controller | 4.5.0 | - | |||||
运行在以下环境 | |||||||||
应用 | f5 | big-iq_centralized_management | 4.6.0 | - | |||||
运行在以下环境 | |||||||||
应用 | f5 | big-iq_cloud | * | From (including) 4.0.0 | Up to (including) 4.5.0 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-iq_cloud_and_orchestration | 1.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | f5 | big-iq_device | * | From (including) 4.2.0 | Up to (including) 4.5.0 | ||||
运行在以下环境 | |||||||||
应用 | f5 | big-iq_security | * | From (including) 4.0.0 | Up to (including) 4.5.0 | ||||
运行在以下环境 | |||||||||
应用 | f5 | enterprise_manager | * | From (including) 3.1.0 | Up to (including) 3.1.1 | ||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 10.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.10 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 13.10 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * | Up to (including) 3.14.3 | |||||
运行在以下环境 | |||||||||
系统 | oracle | linux | 6 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_eus | 6.3 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_eus | 6.4 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 6.3 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel | * | Up to (excluding) 0:3.10.0-123.1.2.el7 | |||||
运行在以下环境 | |||||||||
系统 | suse | suse_linux_enterprise_desktop | 11 | - | |||||
运行在以下环境 | |||||||||
系统 | suse | suse_linux_enterprise_high_availability_extension | 11 | - | |||||
运行在以下环境 | |||||||||
系统 | suse | suse_linux_enterprise_server | 11 | - | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | kernel-default-extra | * | Up to (excluding) 3.12.28-4 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04.5_lts | linux | * | Up to (excluding) 3.2.0-61.93 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | linux | * | Up to (excluding) 3.13.0-24.47 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | linux | * | Up to (excluding) 4.2.0-16.19 | |||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 越权影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-362 | 使用共享资源的并发执行不恰当同步问题(竞争条件) |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论