National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-3002 Detail

Description

The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.

Source:  MITRE      Last Modified:  08/28/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-3002
Original release date:
08/28/2009
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.9 MEDIUM
Vector:
(AV:L/AC:L/Au:N/C:C/I:N/A:N) (legend)
Impact Subscore:
6.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

Vendor Statements (disclaimer)

Official Statement from Red Hat (11/04/2009)

CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols. The Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1). It was addressed in Red Hat Enterprise Linux 3 and Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-1550.html and https://rhn.redhat.com/errata/RHSA-2009-1540.html respectively. The Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2). It was addressed in Red Hat Enterprise Linux 3 via: https://rhn.redhat.com/errata/RHSA-2009-1550.html The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3). The Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5). They were addressed in Red Hat Enterprise Linux 3 via: https://rhn.redhat.com/errata/RHSA-2009-1550.html The raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=09384dfc76e526c3993c09c42e016372dc9dd22c External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=09384dfc76e526c3993c09c42e016372dc9dd22c
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=17ac2e9c58b69a1e25460a568eae1b0dc0188c25 External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=17ac2e9c58b69a1e25460a568eae1b0dc0188c25
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d392475c873c10c10d6d96b94d092a34ebd4791 External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d392475c873c10c10d6d96b94d092a34ebd4791
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=80922bbb12a105f858a8f0abb879cb4302d0ecaa External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=80922bbb12a105f858a8f0abb879cb4302d0ecaa
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e84b90ae5eb3c112d1f208964df1d8156a538289 External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e84b90ae5eb3c112d1f208964df1d8156a538289
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f6b97b29513950bfbf621a83d85b6f86b39ec8db External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f6b97b29513950bfbf621a83d85b6f86b39ec8db
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html External Source SUSE SUSE-SA:2009:054
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html External Source SUSE SUSE-SA:2009:056
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html External Source SUSE SUSE-SA:2010:012
http://www.exploit-db.com/exploits/9521 External Source EXPLOIT-DB 9521
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc7 External Source CONFIRM http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc7
http://www.openwall.com/lists/oss-security/2009/08/27/1 External Source MLIST [oss-security] 20090827 Re: CVE request: kernel: AF_LLC getsockname 5-Byte Stack Disclosure
http://www.openwall.com/lists/oss-security/2009/08/27/2 External Source MLIST [oss-security] 20090827 Re: CVE request: kernel: AF_LLC getsockname 5-Byte Stack Disclosure
http://www.securityfocus.com/archive/1/archive/1/512019/100/0/threaded External Source BUGTRAQ 20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
http://www.securityfocus.com/bid/36150 Exploit External Source BID 36150
http://www.ubuntu.com/usn/USN-852-1 External Source UBUNTU USN-852-1
https://bugzilla.redhat.com/show_bug.cgi?id=519305 Exploit External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=519305
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11611 External Source OVAL oval:org.mitre.oval:def:11611
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11741 External Source OVAL oval:org.mitre.oval:def:11741
https://rhn.redhat.com/errata/RHSA-2009-1540.html External Source REDHAT RHSA-2009:1540
https://rhn.redhat.com/errata/RHSA-2009-1550.html External Source REDHAT RHSA-2009:1550

References to Check Content

Identifier:
oval:org.mitre.oval:def:11611
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11611
Identifier:
oval:org.mitre.oval:def:11741
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11741

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*
Showing 100 of 315 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 2 change records found - show changes