CVE-2008-0600
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
CVE, Inc., Red Hat
http://marc.info/?l=linux-kernel&m=120263652322197&w=2
CVE, Inc., Red Hat
Exploit
http://marc.info/?l=linux-kernel&m=120264520431307&w=2
CVE, Inc., Red Hat
Exploit
http://marc.info/?l=linux-kernel&m=120264773202422&w=2
CVE, Inc., Red Hat
Exploit
http://marc.info/?l=linux-kernel&m=120266328220808&w=2
CVE, Inc., Red Hat
Exploit
http://marc.info/?l=linux-kernel&m=120266353621139&w=2
CVE, Inc., Red Hat
Exploit
http://secunia.com/advisories/28835
CVE, Inc., Red Hat
http://secunia.com/advisories/28858
CVE, Inc., Red Hat
http://secunia.com/advisories/28875
CVE, Inc., Red Hat
http://secunia.com/advisories/28889
CVE, Inc., Red Hat
http://secunia.com/advisories/28896
CVE, Inc., Red Hat
http://secunia.com/advisories/28912
CVE, Inc., Red Hat
http://secunia.com/advisories/28925
CVE, Inc., Red Hat
http://secunia.com/advisories/28933
CVE, Inc., Red Hat
http://secunia.com/advisories/28937
CVE, Inc., Red Hat
http://secunia.com/advisories/29245
CVE, Inc., Red Hat
http://secunia.com/advisories/30818
CVE, Inc., Red Hat
http://securitytracker.com/id?1019393
CVE, Inc., Red Hat
http://wiki.rpath.com/Advisories:rPSA-2008-0052
CVE, Inc., Red Hat
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052
CVE, Inc., Red Hat
http://www.debian.org/security/2008/dsa-1494
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDVSA-2008:043
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
CVE, Inc., Red Hat
http://www.redhat.com/support/errata/RHSA-2008-0129.html
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/488009/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/27704
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/27801
CVE, Inc., Red Hat
http://www.ubuntu.com/usn/usn-577-1
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2008/0487/references
CVE, Inc., Red Hat
https://bugzilla.redhat.com/show_bug.cgi?id=432229
CVE, Inc., Red Hat
https://bugzilla.redhat.com/show_bug.cgi?id=432517
CVE, Inc., Red Hat
https://issues.rpath.com/browse/RPL-2237
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358
CVE, Inc., Red Hat
https://www.exploit-db.com/exploits/5092
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-94
Improper Control of Generation of Code ('Code Injection')
NIST  
Change History
8 change records found show changes
CVE Modified by CVE 11/20/2024 7:42:28 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
Added
Reference
http://marc.info/?l=linux-kernel&m=120263652322197&w=2
Added
Reference
http://marc.info/?l=linux-kernel&m=120264520431307&w=2
Added
Reference
http://marc.info/?l=linux-kernel&m=120264773202422&w=2
Added
Reference
http://marc.info/?l=linux-kernel&m=120266328220808&w=2
Added
Reference
http://marc.info/?l=linux-kernel&m=120266353621139&w=2
Added
Reference
http://secunia.com/advisories/28835
Added
Reference
http://secunia.com/advisories/28858
Added
Reference
http://secunia.com/advisories/28875
Added
Reference
http://secunia.com/advisories/28889
Added
Reference
http://secunia.com/advisories/28896
Added
Reference
http://secunia.com/advisories/28912
Added
Reference
http://secunia.com/advisories/28925
Added
Reference
http://secunia.com/advisories/28933
Added
Reference
http://secunia.com/advisories/28937
Added
Reference
http://secunia.com/advisories/29245
Added
Reference
http://secunia.com/advisories/30818
Added
Reference
http://securitytracker.com/id?1019393
Added
Reference
http://wiki.rpath.com/Advisories:rPSA-2008-0052
Added
Reference
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052
Added
Reference
http://www.debian.org/security/2008/dsa-1494
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2008:043
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
Added
Reference
http://www.redhat.com/support/errata/RHSA-2008-0129.html
Added
Reference
http://www.securityfocus.com/archive/1/488009/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/27704
Added
Reference
http://www.securityfocus.com/bid/27801
Added
Reference
http://www.ubuntu.com/usn/usn-577-1
Added
Reference
http://www.vupen.com/english/advisories/2008/0487/references
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=432229
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=432517
Added
Reference
https://issues.rpath.com/browse/RPL-2237
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358
Added
Reference
https://www.exploit-db.com/exploits/5092
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html
CVE Modified by Red Hat, Inc. 5/13/2024 9:50:38 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 2/12/2023 9:18:44 PM
Action
Type
Old Value
New Value
Changed
Description
CVE-2008-0600 kernel vmsplice_to_pipe flaw
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
Removed
CVSS V2
Red Hat, Inc. (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Removed
Reference
https://access.redhat.com/errata/RHSA-2008:0129 [No Types Assigned]
Removed
Reference
https://access.redhat.com/security/cve/CVE-2008-0600 [No Types Assigned]
Removed
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=432251 [No Types Assigned]
Removed
CVSS V2 Metadata
Obtain Admin/Root Access
CVE Modified by Red Hat, Inc. 2/02/2023 9:15:14 AM
Action
Type
Old Value
New Value
Changed
Description
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
CVE-2008-0600 kernel vmsplice_to_pipe flaw
Added
CVSS V2
Red Hat, Inc. (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Added
Reference
https://access.redhat.com/errata/RHSA-2008:0129 [No Types Assigned]
Added
Reference
https://access.redhat.com/security/cve/CVE-2008-0600 [No Types Assigned]
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=432251 [No Types Assigned]
CPE Deprecation Remap by NIST 10/30/2018 12:25:10 PM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:o:linux:linux_kernel:2.6.19.0:*:*:*:*:*:*:*
OR
*cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 10/15/2018 6:02:04 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/488009/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/488009/100/0/threaded [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/28/2017 9:30:22 PM
Action
Type
Old Value
New Value
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358 [No Types Assigned]
Added
Reference
https://www.exploit-db.com/exploits/5092 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11358 [No Types Assigned]
Removed
Reference
http://www.milw0rm.com/exploits/5092 [Exploit]
Initial CVE Analysis 2/12/2008 5:57:00 PM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2008-0600 NVD
Published Date: 02/12/2008 NVD
Last Modified: 04/08/2025
Source: Red Hat, Inc.