Linux Kernel /dev/cpu/*/msr access control

EntryeditHistoryDiffjsonxmlCTI

A vulnerability was found in Linux Kernel (Operating System) (affected version not known). It has been rated as critical. Affected by this issue is some unknown processing of the file /dev/cpu/*/msr. Applying the patch patch1 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org.

Field02/11/2013 03:32 PM04/24/2017 10:59 PM05/04/2021 03:24 PM
typeOperating SystemOperating SystemOperating System
vendorLinuxLinuxLinux
nameKernelKernelKernel
file/dev/cpu/*/msr/dev/cpu/*/msr/dev/cpu/*/msr
cwe264 (privilege escalation)264 (privilege escalation)264 (privilege escalation)
risk222
cvss2_vuldb_basescore3.33.33.3
cvss2_vuldb_tempscore2.62.62.6
cvss2_vuldb_avLLL
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_nvd_avLLL
cvss2_nvd_acHHH
cvss2_nvd_auNNN
cvss2_nvd_ciCCC
cvss2_nvd_iiCCC
cvss2_nvd_aiCCC
cvss3_meta_basescore5.15.15.1
cvss3_meta_tempscore4.64.64.6
cvss3_vuldb_basescore5.15.15.1
cvss3_vuldb_tempscore4.64.64.6
date1360022400 (02/05/2013)1360022400 (02/05/2013)1360022400 (02/05/2013)
locationGIT RepositoryGIT RepositoryGIT Repository
typeGIT CommitGIT CommitGIT Commit
urlhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00
company_namegrsecuritygrsecuritygrsecurity
confirm_urlhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c903f0456bc69176912dee6dd25c6a66ee1aed00http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c903f0456bc69176912dee6dd25c6a66ee1aed00http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c903f0456bc69176912dee6dd25c6a66ee1aed00
availability111
date1360022400 (02/05/2013)1360022400 (02/05/2013)1360022400 (02/05/2013)
publicity111
urlhttp://grsecurity.net/~spender/msr32.chttp://grsecurity.net/~spender/msr32.chttp://grsecurity.net/~spender/msr32.c
price_0day$25k-$100k$25k-$100k$5k-$25k
namePatchPatchPatch
patch_namepatch1patch1patch1
patch_urlhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00
cveCVE-2013-0268CVE-2013-0268CVE-2013-0268
cve_assigned135475200013547520001354752000
cve_nvd_published136105920013610592001361059200
cve_nvd_summaryThe msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
osvdb900039000390003
secunia524815248152481
secunia_titleUbuntu update for kernelUbuntu update for kernelUbuntu update for kernel
secunia_riskLess CriticalLess CriticalLess Critical
securityfocus578385783857838
securityfocus_titleLinux Kernel 'MSR' Driver Local Privilege Escalation VulnerabilityLinux Kernel 'MSR' Driver Local Privilege Escalation VulnerabilityLinux Kernel 'MSR' Driver Local Privilege Escalation Vulnerability
vulnerabilitycenter385163851638516
vulnerabilitycenter_titleLinux Kernel <3.7.6 Local Application Execution due to a Flaw in the msr_open FunctionLinux Kernel <3.7.6 Local Application Execution due to a Flaw in the msr_open FunctionLinux Kernel <3.7.6 Local Application Execution due to a Flaw in the msr_open Function
vulnerabilitycenter_severityHighHighHigh
vulnerabilitycenter_creationdate136140480013614048001361404800
vulnerabilitycenter_lastupdatedate149169600014916960001491696000
vulnerabilitycenter_reportingdate136019520013601952001360195200
xforce819508195081950
exploitdb272972729727297
nessus_id687856878568785
nessus_nameOracle Linux 5 : kernel (ELSA-2013-0621)Oracle Linux 5 : kernel (ELSA-2013-0621)Oracle Linux 5 : kernel (ELSA-2013-0621)
nessus_filenamecentos_RHSA-2013-0621.naslcentos_RHSA-2013-0621.naslcentos_RHSA-2013-0621.nasl
nessus_familyOracle Linux Local Security ChecksOracle Linux Local Security ChecksOracle Linux Local Security Checks
nessus_port000
nessus_date1373587200 (07/12/2013)1373587200 (07/12/2013)1373587200 (07/12/2013)
openvas_id881684881684881684
openvas_filenamegb_CESA-2013_0621_kernel_centos5.naslgb_CESA-2013_0621_kernel_centos5.naslgb_CESA-2013_0621_kernel_centos5.nasl
openvas_titleCentOS Update for kernel CESA-2013:0621 centos5CentOS Update for kernel CESA-2013:0621 centos5CentOS Update for kernel CESA-2013:0621 centos5
openvas_familyCentOS Local Security ChecksCentOS Local Security ChecksCentOS Local Security Checks
qualys_id216061216061216061
qualys_titleVMware ESX 4.0.0 Patch Release ESX400-201310001 Missing (KB2059495)VMware ESX 4.0.0 Patch Release ESX400-201310001 Missing (KB2059495)VMware ESX 4.0.0 Patch Release ESX400-201310001 Missing (KB2059495)
seealso7746 7840 89237746 7840 89237746 7840 8923
cvss3_vuldb_uiNNN
languageANSI CANSI CANSI C
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcCCC
cvss3_vuldb_ePPP
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
cvss3_vuldb_avLLL
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
person_nameAlan CoxAlan Cox
developer_namespenderspender
oval_idoval:org.mitre.oval:def:26800oval:org.mitre.oval:def:26800
secunia_date1362528000 (03/06/2013)1362528000 (03/06/2013)
securityfocus_date1360195200 (02/07/2013)1360195200 (02/07/2013)
securityfocus_classUnknownUnknown
exploitdb_date1375401600 (08/02/2013)1375401600 (08/02/2013)
nessus_riskMedium
cvss2_nvd_basescore6.2

Do you need the next level of professionalism?

Upgrade your account now!