Vulnerability identifier: #VU95224
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to execute arbitrary code.
Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408530
https://bugzilla.kernel.org/show_bug.cgi?id=8028
https://osvdb.org/34742
https://secunia.com/advisories/24777
https://secunia.com/advisories/26379
https://secunia.com/advisories/26478
https://secunia.com/advisories/26709
https://secunia.com/advisories/26760
https://secunia.com/advisories/27528
https://security.gentoo.org/glsa/glsa-200704-23.xml
https://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
https://www.mandriva.com/security/advisories?name=MDKSA-2007:078
https://www.redhat.com/support/errata/RHSA-2007-0671.html
https://www.redhat.com/support/errata/RHSA-2007-0672.html
https://www.redhat.com/support/errata/RHSA-2007-0673.html
https://www.redhat.com/support/errata/RHSA-2007-0705.html
https://www.redhat.com/support/errata/RHSA-2007-0774.html
https://www.securityfocus.com/bid/23333
https://www.securitytracker.com/id?1018539
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10503
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.