National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-2406 Detail

Description

Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.

Source:  MITRE      Last Modified:  07/31/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-2406
Original release date:
07/31/2009
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.9 MEDIUM
Vector:
(AV:L/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
3.4
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Provides administrator access, Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (08/18/2009)

The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue. Red Hat Enterprise Linux 5 was vulnerable to this issue and was addressed via: https://rhn.redhat.com/errata/RHSA-2009-1193.html

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6352a29305373ae6196491e6d4669f301e26492e External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6352a29305373ae6196491e6d4669f301e26492e
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html External Source SUSE SUSE-SR:2009:015
http://risesecurity.org/advisories/RISE-2009002.txt Exploit External Source MISC http://risesecurity.org/advisories/RISE-2009002.txt
http://www.debian.org/security/2009/dsa-1844 Patch External Source DEBIAN DSA-1844
http://www.debian.org/security/2009/dsa-1845 Patch External Source DEBIAN DSA-1845
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4 Vendor Advisory External Source CONFIRM http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 External Source MANDRIVA MDVSA-2011:029
http://www.redhat.com/support/errata/RHSA-2009-1193.html External Source REDHAT RHSA-2009:1193
http://www.securityfocus.com/archive/1/archive/1/505334/100/0/threaded Exploit External Source BUGTRAQ 20090728 [RISE-2009002] Linux eCryptfs parse_tag_11_packet Literal Data Buffer Overflow Vulnerability
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded External Source BUGTRAQ 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
http://www.securityfocus.com/bid/35851 Patch External Source BID 35851
http://www.securitytracker.com/id?1022663 External Source SECTRACK 1022663
http://www.ubuntu.com/usn/usn-807-1 External Source UBUNTU USN-807-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/2041 Patch; Vendor Advisory External Source VUPEN ADV-2009-2041
http://www.vupen.com/english/advisories/2009/3316 External Source VUPEN ADV-2009-3316
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072 External Source OVAL oval:org.mitre.oval:def:10072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246 External Source OVAL oval:org.mitre.oval:def:8246
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html External Source FEDORA FEDORA-2009-8264
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html External Source FEDORA FEDORA-2009-8144

References to Check Content

Identifier:
oval:org.mitre.oval:def:10072
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:10072
Identifier:
oval:org.mitre.oval:def:8246
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:8246

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*
cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:final:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
Showing 100 of 574 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 3 change records found - show changes