// For flags

CVE-2009-1185

Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.

udev antes de v1.4.1 no verifica si un mensaje NETLINK es generado desde el espacio del kernel, lo que permite a usuarios locales obtener privilegios mediante el envio de un mensaje NETLIINK desde el espacio de usuario.

Versions of udev < 1.4.1 do not verify that netlink messages are coming from the kernel. This allows local users to gain privileges by sending netlink messages from userland.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-31 CVE Reserved
  • 2009-04-15 CVE Published
  • 2009-04-20 First Exploit
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-346: Origin Validation Error
  • CWE-862: Missing Authorization
CAPEC
References (40)
URL Tag Source
http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e2b362d9f23d4c63018709ab5f81a02f72b91e75 X_refsource_confirm
http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e86a923d508c2aed371cdd958ce82489cf2ab615 X_refsource_confirm
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2009/000060.html Mailing List
http://secunia.com/advisories/34731 Not Applicable
http://secunia.com/advisories/34750 Not Applicable
http://secunia.com/advisories/34753 Not Applicable
http://secunia.com/advisories/34771 Not Applicable
http://secunia.com/advisories/34776 Not Applicable
http://secunia.com/advisories/34785 Not Applicable
http://secunia.com/advisories/34787 Not Applicable
http://secunia.com/advisories/34801 Not Applicable
http://secunia.com/advisories/35766 Not Applicable
http://wiki.rpath.com/Advisories:rPSA-2009-0063 Broken Link
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0063 Broken Link
http://www.securityfocus.com/archive/1/502752/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/504849/100/0/threaded Mailing List
http://www.securityfocus.com/bid/34536 Third Party Advisory
http://www.securitytracker.com/id?1022067 Broken Link
http://www.vmware.com/security/advisories/VMSA-2009-0009.html Third Party Advisory
https://launchpad.net/bugs/cve/2009-1185 Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10925 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5975 Signature
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Udev Project
Search vendor "Udev Project"
Udev
Search vendor "Udev Project" for product "Udev"
< 141
Search vendor "Udev Project" for product "Udev" and version " < 141"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Debuginfo
Search vendor "Suse" for product "Linux Enterprise Debuginfo"
10
Search vendor "Suse" for product "Linux Enterprise Debuginfo" and version "10"
sp2
Affected
Suse
Search vendor "Suse"
Linux Enterprise Debuginfo
Search vendor "Suse" for product "Linux Enterprise Debuginfo"
11
Search vendor "Suse" for product "Linux Enterprise Debuginfo" and version "11"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
10.3
Search vendor "Opensuse" for product "Opensuse" and version "10.3"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.0
Search vendor "Opensuse" for product "Opensuse" and version "11.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.1
Search vendor "Opensuse" for product "Opensuse" and version "11.1"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Desktop
Search vendor "Suse" for product "Linux Enterprise Desktop"
10
Search vendor "Suse" for product "Linux Enterprise Desktop" and version "10"
sp2
Affected
Suse
Search vendor "Suse"
Linux Enterprise Desktop
Search vendor "Suse" for product "Linux Enterprise Desktop"
11
Search vendor "Suse" for product "Linux Enterprise Desktop" and version "11"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
10
Search vendor "Suse" for product "Linux Enterprise Server" and version "10"
sp2
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
4.0
Search vendor "Debian" for product "Debian Linux" and version "4.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
5.0
Search vendor "Debian" for product "Debian Linux" and version "5.0"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.06
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.10"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
9
Search vendor "Fedoraproject" for product "Fedora" and version "9"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
10
Search vendor "Fedoraproject" for product "Fedora" and version "10"
-
Affected
Juniper
Search vendor "Juniper"
Ctpview
Search vendor "Juniper" for product "Ctpview"
< 7.1
Search vendor "Juniper" for product "Ctpview" and version " < 7.1"
-
Affected
Juniper
Search vendor "Juniper"
Ctpview
Search vendor "Juniper" for product "Ctpview"
7.1
Search vendor "Juniper" for product "Ctpview" and version "7.1"
-
Affected
Juniper
Search vendor "Juniper"
Ctpview
Search vendor "Juniper" for product "Ctpview"
7.1
Search vendor "Juniper" for product "Ctpview" and version "7.1"
r1
Affected
Juniper
Search vendor "Juniper"
Ctpview
Search vendor "Juniper" for product "Ctpview"
7.2
Search vendor "Juniper" for product "Ctpview" and version "7.2"
-
Affected