Vulnerability Name:

CVE-2009-4020 (CCN-54603)

Assigned:2009-12-04
Published:2009-12-04
Updated:2023-02-13
Summary:Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.2 Medium (REDHAT CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
4.6 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-4020

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: VMSA-2010-0009
ESXi utilities and ESX Service Console third party updates

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2010-0046
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2010-0076
Important: kernel security and bug fix update

Source: CCN
Type: SA39920
VMware vMA kernel Multiple Vulnerabilities

Source: CCN
Type: SA39972
VMware ESXi ntp Mode 7 Request Denial of Service

Source: CCN
Type: SA39973
VMware ESX Multiple krb5 Vulnerabilities

Source: CCN
Type: SA39974
VMware ESX GCC libtool Search Path Privilege Escalation Security Issue

Source: CCN
Type: SA39975
VMware ESX gzip unlzw() Integer Underflow Vulnerability

Source: CCN
Type: SA39976
VMware vMA OpenSSL CRYPTO_free_all_ex_data() Memory Leak Vulnerability

Source: CCN
Type: SA39977
VMware vMA Multiple krb5 Vulnerabilities

Source: CCN
Type: SA39979
VMware vMA GCC libtool Search Path Privilege Escalation Security Issue

Source: CCN
Type: SA39980
VMware vMA gzip unlzw() Integer Underflow Vulnerability

Source: CCN
Type: SA39981
VMware vMA sudo Privilege Escalation Security Issues

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: Patch
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: DEBIAN
Type: DSA-2003
linux-2.6 -- privilege escalation/denial of service

Source: DEBIAN
Type: DSA-2005
linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak

Source: CCN
Type: The Linux Kernel Archives Web site
Linux Kernel

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: oss-security Mailing List, Fri, 04 Dec 2009 12:49:46 +0800
CVE-2009-4020 kernel: hfs buffer overflow

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: USN-894-1
Linux kernel vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
linux-kernel-hfs-bo(54603)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: SUSE
Type: SUSE-SA:2010:005
Linux kernel security problems

Source: SUSE
Type: SUSE-SA:2010:016
Linux kernel security update

Source: SUSE
Type: SUSE-SA:2010:019
Linux kernel security update

Source: SUSE
Type: SUSE-SA:2010:023
Linux kernel security update

Source: SUSE
Type: SUSE-SA:2010:036
Linux kernel security update

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20094020
    V
    CVE-2009-4020
    2022-05-20
    oval:org.opensuse.security:def:28260
    P
    Security update for lynx (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27831
    P
    Security update for lxc
    2020-12-01
    oval:org.opensuse.security:def:28553
    P
    Security update for flash-player
    2020-12-01
    oval:org.opensuse.security:def:28035
    P
    Fixing security issues on OBS toolchain (Important)
    2020-12-01
    oval:org.opensuse.security:def:29287
    P
    Security update for Real Time Linux kernel
    2020-12-01
    oval:org.opensuse.security:def:28412
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27832
    P
    Security update for lxc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28569
    P
    Security update for lcms
    2020-12-01
    oval:org.opensuse.security:def:28119
    P
    Security update for gstreamer-0_10-plugins-base (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28465
    P
    Security update for xorg-x11-libXdmcp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27843
    P
    Security update for net-snmp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28613
    P
    Security update for xorg-x11-server
    2020-12-01
    oval:org.opensuse.security:def:28176
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:28514
    P
    Security update for openssl1 (Important)
    2020-12-01
    oval:org.opensuse.security:def:27907
    P
    Security update for Xen
    2020-12-01
    oval:org.opensuse.security:def:29251
    P
    Security update for syslog-ng (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:25739
    P
    SUSE-SU-2013:1832-1 -- Security update for Linux kernel
    2014-09-08
    oval:org.mitre.oval:def:13189
    P
    USN-894-1 -- linux, linux-source-2.6.15 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:6841
    P
    DSA-2003 linux-2.6 -- privilege escalation/denial of service
    2014-06-23
    oval:org.mitre.oval:def:20241
    P
    DSA-2003-1 linux-2.6 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:7532
    P
    DSA-2005 linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak
    2014-06-23
    oval:org.mitre.oval:def:22940
    P
    ELSA-2010:0046: kernel security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21777
    P
    RHSA-2010:0046: kernel security and bug fix update (Important)
    2014-02-24
    oval:org.mitre.oval:def:6750
    V
    hfs Subsystem Stack-based Buffer Overflow Vulnerability
    2014-01-20
    oval:org.mitre.oval:def:10091
    V
    Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
    2013-04-29
    oval:org.debian:def:2005
    V
    privilege escalation/denial of service/sensitive memory leak
    2010-02-27
    oval:org.debian:def:2003
    V
    privilege escalation/denial of service
    2010-02-22
    oval:com.redhat.rhsa:def:20100076
    P
    RHSA-2010:0076: kernel security and bug fix update (Important)
    2010-02-02
    oval:com.redhat.rhsa:def:20100046
    P
    RHSA-2010:0046: kernel security and bug fix update (Important)
    2010-01-19
    BACK
    linux linux kernel 2.6.32
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    canonical ubuntu 6.06
    novell suse linux enterprise server 10 sp2
    redhat enterprise linux 5
    debian debian linux 4.0
    redhat enterprise linux 5
    novell open enterprise server *
    canonical ubuntu 8.04
    novell opensuse 11.0
    novell suse linux enterprise server 10 sp2
    vmware esx server 4.0