Vulnerability Name: | CVE-2007-3104 (CCN-35146) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2007-06-22 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2007-06-22 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C) 3.7 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: CCN Type: Red Hat Bugzilla Bug 242558 CVE-2007-3104 Null pointer to an inode in a dentry can cause an oops in sysfs_readdir Source: MISC Type: UNKNOWN http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558 Source: MITRE Type: CNA CVE-2007-3104 Source: SUSE Type: UNKNOWN SUSE-SA:2007:064 Source: OSVDB Type: UNKNOWN 37115 Source: CCN Type: RHSA-2007-0488 Important: kernel security update Source: REDHAT Type: Vendor Advisory RHSA-2007:0488 Source: CCN Type: RHSA-2008-0089 Important: kernel security and bug fix update Source: CCN Type: SA25771 Linux Kernel "sysfs_readdir()" Denial of Service Source: SECUNIA Type: Vendor Advisory 25771 Source: SECUNIA Type: Vendor Advisory 25838 Source: CCN Type: SA26289 Avaya Products Linux Kernel Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 26289 Source: SECUNIA Type: Vendor Advisory 26643 Source: SECUNIA Type: Vendor Advisory 26651 Source: SECUNIA Type: Vendor Advisory 27912 Source: SECUNIA Type: Vendor Advisory 28033 Source: SECUNIA Type: Vendor Advisory 28643 Source: CCN Type: SECTRACK ID: 1018289 Linux Kernel sysfs_readdir() NULL Pointer Dereference Lets Local Users Deny Service Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm Source: CCN Type: ASA-2007-287 kernel security update (RHSA-2007-0488) Source: DEBIAN Type: UNKNOWN DSA-1428 Source: DEBIAN Type: DSA-1428 linux-2.6 -- several vulnerabilities Source: CCN Type: The Linux Kernel Archives Web site The Linux Kernel Archives Source: CCN Type: OSVDB ID: 37115 Linux Kernel on Red Hat Enterprise sysfs_readdir() Function Local DoS Source: REDHAT Type: UNKNOWN RHSA-2008:0089 Source: BID Type: UNKNOWN 24631 Source: CCN Type: BID-24631 Linux Kernel SysFS_ReadDir NULL Pointer Dereference Vulnerability Source: SECTRACK Type: UNKNOWN 1018289 Source: CCN Type: USN-508-1 Linux kernel vulnerabilities Source: UBUNTU Type: UNKNOWN USN-508-1 Source: CCN Type: USN-509-1 Linux kernel vulnerabilities Source: UBUNTU Type: UNKNOWN USN-509-1 Source: CCN Type: USN-510-1 Linux kernel vulnerabilities Source: UBUNTU Type: UNKNOWN USN-510-1 Source: XF Type: UNKNOWN kernel-sysfsreaddir-dos(35146) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11233 Source: SUSE Type: SUSE-SA:2007:064 Linux kernel security problems | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |