TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2013-6282

HIGHCISA KEV
8.8

Beschreibung

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

CVE Details

CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht11/20/2013
Zuletzt geandert4/22/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerLinux
ProduktKernel
SchwachstellennameLinux Kernel Improper Input Validation Vulnerability
KEV Aufnahmedatum2022-09-15
Behebungsfrist2022-10-06
Ransomware-NutzungUnknown

Betroffene Produkte

linux:linux_kernel

Schwachen (CWE)

CWE-20CWE-20

Referenzen

http://www.openwall.com/lists/oss-security/2013/11/14/11(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/63734(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2067-1(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40975/(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.