National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2014-0069 Detail

Description

The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.

Source:  MITRE      Last Modified:  02/28/2014

Quick Info

CVE Dictionary Entry:
CVE-2014-0069
Original release date:
02/28/2014
Last revised:
12/15/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.2 MEDIUM
Vector:
(AV:L/AC:H/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
1.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
High
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://article.gmane.org/gmane.linux.kernel.cifs/9401 External Source MLIST [linux-cifs] 20140214 [PATCH] cifs: ensure that uncached writes handle unmapped areas correctly
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5d81de8e8667da7135d3a32a964087c0faf5483f Exploit; Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5d81de8e8667da7135d3a32a964087c0faf5483f
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html External Source SUSE SUSE-SU-2014:0459
http://rhn.redhat.com/errata/RHSA-2014-0328.html External Source REDHAT RHSA-2014:0328
http://www.openwall.com/lists/oss-security/2014/02/17/4 External Source MLIST [oss-security] 20140217 CVE-2014-0069 -- kernel: cifs: incorrect handling of bogus user pointers during uncached writes
http://www.securityfocus.com/bid/65588 External Source BID 65588
https://bugzilla.redhat.com/show_bug.cgi?id=1064253 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1064253
https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f Exploit; Patch External Source CONFIRM https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*
Showing 100 of 354 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 2 change records found - show changes