Home
Insightful &
Helpful Articles

Here is what we're working on and
thinking at Hedgehog security.

Age in Days
CVSS Score
Patch within next
Risk Level

3495


10.0

30 Days

Critical

 

This vulnerability is 9 years 6 months and 25 days old there are exploits publicly available for it. The vulnerability itself is over a year old, and with there being exploits publicly available it is highly advisable that this vulnerability is patched immediately.

 

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

 

Vulnerability Description

The remote Ubuntu host is missing one or more security-related patches. The host is therefore vulnerable to a number of vulnerabilities, including but not limited to:

  • NFS did not correctly handle races between fcntl and interrupts. A local attacker on an NFS mount could consume unlimited kernel memory, leading to a denial of service. Ubuntu 8.10 was not affected. (CVE-2008-4307)
  • Sparc syscalls did not correctly check mmap regions. A local attacker could cause a system panic, leading to a denial of service. Ubuntu 8.10 was not affected. (CVE-2008-6107)
  • In certain situations, cloned processes were able to send signals to parent processes, crossing privilege boundaries. A local attacker could send arbitrary signals to parent processes, leading to a denial of service. (CVE-2009-0028)
  • The kernel keyring did not free memory correctly. A local attacker could consume unlimited kernel memory, leading to a denial of service. (CVE-2009-0031)
  • The SCTP stack did not correctly validate FORWARD-TSN packets. A remote attacker could send specially crafted SCTP traffic causing a system crash, leading to a denial of service. (CVE-2009-0065)
  • The eCryptfs filesystem did not correctly handle certain VFS return codes. A local attacker with write access to an eCryptfs filesystem could cause a system crash, leading to a denial of service. (CVE-2009-0269)
  • The Dell platform device did not correctly validate user parameters. A local attacker could perform specially crafted reads to crash the system, leading to a denial of service. (CVE-2009-0322)
  • The page fault handler could consume stack memory. A local attacker could exploit this to crash the system or gain root privileges with a Kprobe registered. Only Ubuntu 8.10 was affected. (CVE-2009-0605)
  • Network interfaces statistics for the SysKonnect FDDI driver did not check capabilities. A local user could reset statistics, potentially interfering with packet accounting systems. (CVE-2009-0675)
  • The getsockopt function did not correctly clear certain parameters. A local attacker could read leaked kernel memory, leading to a loss of privacy. (CVE-2009-0676)
  • The ext4 filesystem did not correctly clear group descriptors when resizing. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2009-0745)
  • The ext4 filesystem did not correctly validate certain fields. A local attacker could mount a malicious ext4 filesystem, causing a system crash, leading to a denial of service. (CVE-2009-0746, CVE-2009-0747, CVE-2009-0748)
  • The syscall interface did not correctly validate parameters when crossing the 64-bit/32-bit boundary. A local attacker could bypass certain syscall restricts via crafted syscalls. (CVE-2009-0834, CVE-2009-0835)
  • The shared memory subsystem did not correctly handle certain shmctl calls when CONFIG_SHMEM was disabled. Ubuntu kernels were not vulnerable since CONFIG_SHMEM is enabled by default. (CVE-2009-0859
  • The virtual consoles did not correctly handle certain UTF-8 sequences. A local attacker on the physical console could exploit this to cause a system crash, leading to a denial of service. (CVE-2009-1046).

 

Solution

Update the affected packages.

 

Further Information


 

CVE References

CVE-2008-4307 NIST | MITRE | CVEDetails
CVE-2008-6107 NIST | MITRE | CVEDetails
CVE-2009-0028 NIST | MITRE | CVEDetails
CVE-2009-0031 NIST | MITRE | CVEDetails
CVE-2009-0065 NIST | MITRE | CVEDetails
CVE-2009-0269 NIST | MITRE | CVEDetails
CVE-2009-0322 NIST | MITRE | CVEDetails
CVE-2009-0605 NIST | MITRE | CVEDetails
CVE-2009-0675 NIST | MITRE | CVEDetails
CVE-2009-0676 NIST | MITRE | CVEDetails
CVE-2009-0745 NIST | MITRE | CVEDetails
CVE-2009-0746 NIST | MITRE | CVEDetails
CVE-2009-0747 NIST | MITRE | CVEDetails
CVE-2009-0748 NIST | MITRE | CVEDetails
CVE-2009-0834 NIST | MITRE | CVEDetails
CVE-2009-0835 NIST | MITRE | CVEDetails
CVE-2009-0859 NIST | MITRE | CVEDetails
CVE-2009-1046 NIST | MITRE | CVEDetails

 

Get in touch

Should you have any questions regarding this or any security matter, please do not hesitate to get in touch by emailing the Hedgehog Cyber Operations Team.

Whilst every effort is made to ensure the accuracy and robustness of any information presented, it is not possible for Hedgehog Cyber to test every possible scenario an organisation may face, and Hedgehog Cyber cannot be held liable for any loss or damage which may arise from taking action on any of the contents provided. Hedgehog Cyber strongly advises that all recommendations, solutions and detection methods detailed, are thoroughly reviewed and tested in non-production environments before being considered suitable for production release, in-line with any existing internal change control procedures.