CVE-2008-5701
 
Severity Score
4.7
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table.
Error de índice de array en arch/mips/kernel/scall64-o32.S en el kernel de Linux anterior a 2.6.28-rc8 en plataformas MIPS de 64 bits, permite a usuarios locales provocar una denegación de servicio (caída del sistema) a través de una llamada al sistema 032 con un número de llamada pequeño, esto provoca un intento de operación de lectura fuera del rango de la tabla de la llamada al sistema.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-12-22 CVE Reserved
- 2008-12-22 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=e807f9574e37a3f202e677feaaad1b7c5d2c0db8 | X_refsource_confirm | |
http://openwall.com/lists/oss-security/2008/12/09/1 | Mailing List | |
http://secunia.com/advisories/33078 | Third Party Advisory | |
http://secunia.com/advisories/34981 | Third Party Advisory | |
http://secunia.com/advisories/35011 | Third Party Advisory | |
http://www.securityfocus.com/bid/32716 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47190 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2009/dsa-1787 | 2023-11-07 | |
http://www.debian.org/security/2009/dsa-1794 | 2023-11-07 | |
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc8 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version " <= 2.6.28" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc2 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc3 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc4 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc5 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc6 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.28 Search vendor "Linux" for product "Linux Kernel" and version "2.6.28" | rc7 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
|