CVE-2009-3080

Current Description

Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.

Basic Data

PublishedNovember 20, 2009
Last ModifiedSeptember 09, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-129
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel2.6.32rc5******
    2.3OSLinuxLinux Kernel2.6.32rc4******
    2.3OSLinuxLinux Kernel2.6.32rc3******
    2.3OSLinuxLinux Kernel2.6.32rc1******
    2.3OSLinuxLinux Kernel2.6.32-******
    2.3OSLinuxLinux Kernel********2.6.31.6
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSSuseLinux Enterprise Server10sp3**-***
    2.3OSSuseLinux Enterprise Server10sp2**-***
    2.3OSSuseLinux Enterprise Desktop10sp3******
    2.3OSSuseLinux Enterprise Desktop10sp2******
    2.3OSOpensuseOpensuse11.2*******
    2.3OSOpensuseOpensuse11.1*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux4.0*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux9.10*******
    2.3OSCanonicalUbuntu Linux9.04*******
    2.3OSCanonicalUbuntu Linux8.10*******
    2.3OSCanonicalUbuntu Linux8.04*******
    2.3OSCanonicalUbuntu Linux6.06*******
  • OR - Configuration 5
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSVmwareEsx3.5*******
  • OR - Configuration 6
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSRedhatEnterprise Linux Server Workstation5.0*******
    2.3OSRedhatEnterprise Linux Server5.0*******
    2.3OSRedhatEnterprise Linux Eus5.4*******
    2.3OSRedhatEnterprise Linux Desktop5.0*******
    2.3ApplicationRedhatVirtualization5.0*******
  • OR - Configuration 7
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSRedhatFedora10*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 4.0
Redhat Enterprise Linux Eus 5.4
Redhat Enterprise Linux Server Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Fedora 10
Redhat Virtualization 5.0
Redhat Enterprise Linux Server 5.0
Canonical Ubuntu Linux 6.06, 8.04, 8.10, 9.04, 9.10
Opensuse Opensuse 11.1, 11.2
Vmware Esx 3.5
Linux Linux Kernel *, 2.6.32
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Server 10

References

NameSourceURLTags
oval:org.mitre.oval:def:10989OVALhttps://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:10989Mailing List Mailing List Mailing List Mailing List Mailing List Mailing List Broken Link Broken Link Broken Link Broken Link Broken Link Third Party Advisory Third Party Advisory Broken Link Broken Link Broken Link Broken Link Broken Link Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory Mailing List
http://www.vmware.com/security/advisories/VMSA-2011-0009.htmlCONFIRMhttp://www.vmware.com/security/advisories/VMSA-2011-0009.htmlPATCH Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory Third Party Advisory VDB Entry Third Party Advisory
37068BIDhttp://www.securityfocus.com/bid/37068Vendor Advisory
USN-864-1UBUNTUhttp://www.ubuntu.com/usn/usn-864-1
RHSA-2010:0882REDHAThttp://www.redhat.com/support/errata/RHSA-2010-0882.html
RHSA-2010:0041REDHAThttp://www.redhat.com/support/errata/RHSA-2010-0041.html
MDVSA-2011:051MANDRIVAhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:051
MDVSA-2010:030MANDRIVAhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:030
DSA-2005DEBIANhttp://www.debian.org/security/2010/dsa-2005
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.32-rc8CONFIRMhttp://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.32-rc8
38276SECUNIAhttp://secunia.com/advisories/38276
http://support.avaya.com/css/P8/documents/100073666CONFIRMhttp://support.avaya.com/css/P8/documents/100073666
38017SECUNIAhttp://secunia.com/advisories/38017
37909SECUNIAhttp://secunia.com/advisories/37909
37720SECUNIAhttp://secunia.com/advisories/37720
37435SECUNIAhttp://secunia.com/advisories/37435
SUSE-SA:2010:013SUSEhttp://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
SUSE-SA:2010:005SUSEhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
SUSE-SA:2010:001SUSEhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
SUSE-SA:2009:064SUSEhttp://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
SUSE-SA:2009:061SUSEhttp://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=690e744869f3262855b83b4fb59199cf142765b0CONFIRMhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=690e744869f3262855b83b4fb59199cf142765b0
oval:org.mitre.oval:def:12862OVALhttps://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:12862
oval:org.mitre.oval:def:7101OVALhttps://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7101
RHSA-2010:0046REDHAThttps://rhn.redhat.com/errata/RHSA-2010-0046.html
RHSA-2010:0095REDHAThttps://rhn.redhat.com/errata/RHSA-2010-0095.html
FEDORA-2009-13098FEDORAhttps://www.redhat.com/archives/fedora-package-announce/2009-December/msg00777.html