Linux Kernel IA32 System Call Lets Local Users Gain Elevated Privileges
|
SecurityTracker Alert ID: 1018748 |
SecurityTracker URL: http://securitytracker.com/id/1018748
|
CVE Reference:
CVE-2007-4573
(Links to External Site)
|
Date: Sep 27 2007
|
Impact:
Root access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 2.6.22.7
|
Description:
A vulnerability was reported in the Linux Kernel, affecting the x86_64 architecture. A local user can obtain root privileges on the target system.
The IA32 system call emulation function on AMD64 and Intel 64 platforms does not properly validate the %RAX register. A local user may be able to exploit this to access the system call table and execute arbitrary commands on the target system with root privileges.
The vendor was notified on September 18, 2007.
Wojciech Purczynski of COSEINC PTE Ltd. and iSEC Security Research reported this vulnerability.
|
Impact:
A local user can obtain root privileges on the target system.
|
Solution:
The vendor has issued a fixed version (2.6.22.7).
|
Vendor URL: www.kernel.org/ (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|