CVE-2009-2692
Linux Kernel 2.x (Android) - 'sock_sendpage()' Local Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
14Exploited in Wild
-Decision
Descriptions
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
El kernel de Linux versiones 2.6.0 hasta 2.6.30.4 y 2.4.4 hasta 2.4.37.4, no inicia todos los punteros de función para operaciones de socket en estructuras de proto_ops, lo que permite a los usuarios locales activar una desreferencia de puntero NULL y alcanzar privilegios mediante el uso de mmap que asigna la página cero, inserta el código arbitrario en esta página y luego invoca una operación no disponible, como es demostrado por la operación de sendpage (función sock_sendpage) en un socket PF_PPPOX.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-08-05 CVE Reserved
- 2009-08-14 CVE Published
- 2009-08-14 First Exploit
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
- CWE-908: Use of Uninitialized Resource
CAPEC
References (49)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/9477 | 2009-08-18 | |
https://www.exploit-db.com/exploits/19933 | 2012-07-19 | |
https://www.exploit-db.com/exploits/9545 | 2009-08-31 | |
https://www.exploit-db.com/exploits/9598 | 2009-09-09 | |
https://www.exploit-db.com/exploits/9479 | 2009-08-24 | |
https://www.exploit-db.com/exploits/9641 | 2009-09-11 | |
https://www.exploit-db.com/exploits/9435 | 2009-08-14 | |
https://www.exploit-db.com/exploits/9436 | 2009-08-14 | |
https://github.com/jdvalentini/CVE-2009-2692 | 2018-07-12 | |
http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html | 2024-08-07 | |
http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html | 2024-08-07 | |
http://www.exploit-db.com/exploits/19933 | 2024-08-07 | |
http://www.exploit-db.com/exploits/9477 | 2024-08-07 | |
http://www.securityfocus.com/bid/36038 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2009/08/14/1 | 2024-02-08 | |
http://www.vupen.com/english/advisories/2009/2272 | 2024-02-08 | |
https://bugzilla.redhat.com/show_bug.cgi?id=516949 | 2009-09-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.4.4 < 2.4.37.5 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.4.4 < 2.4.37.5" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.0 < 2.6.30.5 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.0 < 2.6.30.5" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Real Time Search vendor "Suse" for product "Linux Enterprise Real Time" | 10 Search vendor "Suse" for product "Linux Enterprise Real Time" and version "10" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 4.8 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "4.8" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 5.3 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "5.3" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Aus Search vendor "Redhat" for product "Enterprise Linux Server Aus" | 5.3 Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "5.3" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "5.0" | - |
Affected
|