CVE-2009-2698

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 Broken Link Vendor Advisory
http://secunia.com/advisories/36430 Broken Link Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=518034 Issue Tracking Third Party Advisory
http://secunia.com/advisories/23073 Broken Link Vendor Advisory
http://www.securitytracker.com/id?1022761 Broken Link Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2009/08/25/1 Mailing List
http://secunia.com/advisories/36510 Broken Link Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/36108 Broken Link Exploit Patch Third Party Advisory VDB Entry
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link Third Party Advisory
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
http://www.vupen.com/english/advisories/2009/3316 Permissions Required
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://secunia.com/advisories/37471 Broken Link Vendor Advisory
http://secunia.com/advisories/37298 Broken Link Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 Broken Link Third Party Advisory
http://secunia.com/advisories/37105 Broken Link Vendor Advisory
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*

History

28 Dec 2023, 15:22

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/37471 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1223.html - Vendor Advisory (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory
References (CONFIRM) http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Vendor Advisory (CONFIRM) http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/36430 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1222.html - Vendor Advisory (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Third Party Advisory (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/37298 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id?1022761 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/512019/100/0/threaded - Third Party Advisory, VDB Entry (BUGTRAQ) http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/37105 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/36108 - Exploit, Patch, Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/507985/100/0/threaded - Third Party Advisory, VDB Entry (BUGTRAQ) http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-1233.html - Third Party Advisory (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/36510 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/23073 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link
CPE cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
First Time Redhat enterprise Linux Desktop
Fedoraproject
Redhat enterprise Linux Server Aus
Fedoraproject fedora
Redhat enterprise Linux Workstation
Redhat enterprise Linux Eus
Vmware esxi
Vmware vcenter Server
Redhat enterprise Linux Server
Vmware
Redhat
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8

07 Nov 2023, 02:04

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 -

Information

Published : 2009-08-27 17:30

Updated : 2023-12-28 15:22


NVD link : CVE-2009-2698

Mitre link : CVE-2009-2698


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server_aus
  • enterprise_linux_workstation

vmware

  • vcenter_server
  • esxi

fedoraproject

  • fedora

canonical

  • ubuntu_linux

suse

  • linux_enterprise_server
  • linux_enterprise_desktop

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference