CVE-2014-9645
Ubuntu Security Notice USN-3935-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
La función add_probe en modutils/modprobe.c en BusyBox en versiones anteriores a 1.23.0 permite a usuarios locales eludir las restricciones previstas al cargar los módulos del kernel a través de un caracter / (barra oblicua) en un nombre de módulo, tal como lo demuestra un comando "ifconfig /usbserial up" o un comando "mount -t /snd_pcm none /".
Tyler Hicks discovered that BusyBox incorrectly handled symlinks inside tar archives. If a user or automated system were tricked into processing a specially crafted tar archive, a remote attacker could overwrite arbitrary files outside of the current directory. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. Mathias Krause discovered that BusyBox incorrectly handled kernel module loading restrictions. A local attacker could possibly use this issue to bypass intended restrictions. This issue only affected Ubuntu 14.04 LTS. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-24 CVE Reserved
- 2015-02-09 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2020/Mar/15 | Mailing List |
|
http://www.securityfocus.com/bid/72324 | Vdb Entry | |
https://bugs.busybox.net/show_bug.cgi?id=7652 | Issue Tracking | |
https://bugzilla.redhat.com/show_bug.cgi?id=1185707 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | 2019-04-03 | |
http://openwall.com/lists/oss-security/2015/01/24/4 | 2019-04-03 | |
https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu | 2019-04-03 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201503-13 | 2019-04-03 | |
https://usn.ubuntu.com/3935-1 | 2019-04-03 |