Vulnerability Name: | CVE-2008-5396 (CCN-46978) | ||||||||||||
Assigned: | 2008-11-23 | ||||||||||||
Published: | 2008-11-23 | ||||||||||||
Updated: | 2009-05-14 | ||||||||||||
Summary: | Array index error in the (1) torisa.c and (2) dahdi/tor2.c drivers in Zaptel (aka DAHDI) 1.4.11 and earlier allows local users in the dialout group to overwrite an integer value in kernel memory by writing to /dev/zap/ctl, related to missing validation of the sync field associated with the ZT_SPANCONFIG ioctl. | ||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.5 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: CCN Type: Debian Bug report logs - #507459 zaptel: insufficient input validation in some zaptel drivers Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507459 Source: CONFIRM Type: UNKNOWN http://bugs.digium.com/view.php?id=13954 Source: MITRE Type: CNA CVE-2008-5396 Source: CCN Type: SA32947 Zaptel "ZT_SPANCONFIG" IOCTL Privilege Escalation Vulnerabilities Source: SECUNIA Type: UNKNOWN 32947 Source: CCN Type: SA32960 DAHDI "ZT_SPANCONFIG" IOCTL Privilege Escalation Vulnerability Source: SECUNIA Type: UNKNOWN 32960 Source: CCN Type: Digium SVN Repository Revision 4587 Source: DEBIAN Type: DSA-1699 zaptel -- array index error Source: MLIST Type: UNKNOWN [oss-security] 20081203 CVE Request (zaptel) Source: CCN Type: OSVDB ID: 50698 Zaptel Multiple Driver ZT_SPANCONFIG IOCTL Sync Field Local Memory Overwrite Source: CCN Type: BID-32575 Digium Zaptel Multiple Local Privilege Escalation and Denial of Service Vulnerabilities Source: XF Type: UNKNOWN zaptel-tor2spanconfig-privilege-escalation(46978) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |