Vulnerability Name:

CVE-2009-0342 (CCN-48209)

Assigned:2009-01-23
Published:2009-01-23
Updated:2018-10-11
Summary:Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2009-0342

Source: CCN
Type: CESA-2009-001 - rev 1
Linux syscall interception technologies partial bypass

Source: MISC
Type: Exploit
http://scary.beasts.org/security/CESA-2009-001.html

Source: MISC
Type: UNKNOWN
http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html

Source: CONFIRM
Type: UNKNOWN
http://www.citi.umich.edu/u/provos/systrace/

Source: CCN
Type: OSVDB ID: 52201
Linux Kernel syscall Filtering 32/64-bit Switching Bypass

Source: CCN
Type: OSVDB ID: 52461
Linux Kernel 32bit/64bit audit_syscall_entry Function 32/64 Bit Syscall Cross-handling Audit Configuration Restriction Bypass

Source: CCN
Type: OSVDB ID: 52462
Linux Kernel seccomp Subsystem kernel/seccomp.c __secure_computing Function 32/64 Bit Syscall Cross-handling Access Restriction Bypass

Source: CCN
Type: OSVDB ID: 53534
Systrace on x86_64 Linux Local Syscall Handling Access Restriction Bypass

Source: CCN
Type: Niels Provos Web site
Systrace 1.6f with 64-bit Linux ptrace support

Source: BUGTRAQ
Type: UNKNOWN
20090123 Problems with syscall filtering technologies on Linux

Source: BID
Type: Exploit
33417

Source: CCN
Type: BID-33417
Systrace 64-Bit Aware Linux Kernel Privilege Escalation Vulnerability

Source: XF
Type: UNKNOWN
systrace-64bit-security-bypass(48209)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:provos:systrace:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.6a:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.6b:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.6c:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:1.6d:*:*:*:*:*:*:*
  • OR cpe:/a:provos:systrace:*:*:*:*:*:*:*:* (Version <= 1.6e)
  • AND
  • cpe:/o:linux:linux_kernel:_nil_:_nil_:x86_64:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:niels:provos_systrace:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:niels:provos_systrace:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:niels:provos_systrace:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:niels:provos_systrace:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:niels:provos_systrace:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:niels_provos:systrace:1.6e:*:*:*:*:*:*:*
  • OR cpe:/a:niels_provos:systrace:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:niels_provos:systrace:1.6a:*:*:*:*:*:*:*
  • OR cpe:/a:niels_provos:systrace:1.6b:*:*:*:*:*:*:*
  • OR cpe:/a:niels_provos:systrace:1.6c:*:*:*:*:*:*:*
  • OR cpe:/a:niels_provos:systrace:1.6d:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    provos systrace 1.1
    provos systrace 1.2
    provos systrace 1.3
    provos systrace 1.4
    provos systrace 1.5
    provos systrace 1.6
    provos systrace 1.6a
    provos systrace 1.6b
    provos systrace 1.6c
    provos systrace 1.6d
    provos systrace *
    linux linux kernel _nil_ _nil_
    niels provos systrace 1.4
    niels provos systrace 1.5
    niels provos systrace 1.3
    niels provos systrace 1.2
    niels provos systrace 1.1
    niels_provos systrace 1.6e
    niels_provos systrace 1.6
    niels_provos systrace 1.6a
    niels_provos systrace 1.6b
    niels_provos systrace 1.6c
    niels_provos systrace 1.6d
    mandriva linux 2009.0
    mandriva linux 2009.0 -