#VU13505 Privilege escalation in Linux kernel - CVE-2018-12714

 

#VU13505 Privilege escalation in Linux kernel - CVE-2018-12714

Published: June 26, 2018 / Updated: June 28, 2018


Vulnerability identifier: #VU13505
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2018-12714
CWE-ID: CWE-787
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to the filter-parsing component, as defined in the kernel/trace/trace_events_filter.c source code file of the affected software, could be called without a filter, which would result in an N=0 case. A local attacker can make perf_event_open and mmap system calls that submit malicious input, trigger a slab out-of-bounds write condition in the predicate_parse function and cause the system to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in complete system compromise.


Remediation

Install update from vendor's website.

External links