CVE-2014-0196

CVSS V2 Medium 6.9 CVSS V3 None
Description
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Overview
  • CVE ID
  • CVE-2014-0196
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-05-07T10:55:04
  • Last Modified Date
  • 2023-02-13T00:36:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 3.14.3
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:* 1 OR
cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:* 1 OR
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:* 1 OR
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.5.1
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 1 OR 11.3.0 11.5.1
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.5.1
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 1 OR 11.4.0 11.5.1
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.5.1
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.3.0
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.5.1
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.5.1
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.5.1
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 1 OR 11.3.0 11.5.1
cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.4.1
cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.3.0
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.3.0
cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.5.0
cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:* 1 OR 4.2.0 4.5.0
cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.5.0
cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* 1 OR 3.1.0 3.1.1
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 6.9
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.4
  • Impact Score
  • 10
References
Reference URL Reference Tags
https://bugzilla.redhat.com/show_bug.cgi?id=1094232 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/05/6 Mailing List Third Party Advisory
http://bugzilla.novell.com/show_bug.cgi?id=875690 Permissions Required Third Party Advisory
http://pastebin.com/raw.php?i=yTSFUBgZ Exploit Mailing List Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00 Exploit Mailing List Patch Vendor Advisory
https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 Exploit Patch Third Party Advisory
http://www.ubuntu.com/usn/USN-2199-1 Third Party Advisory
http://www.debian.org/security/2014/dsa-2928 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-2201-1 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0512.html Third Party Advisory
http://www.debian.org/security/2014/dsa-2926 Third Party Advisory
http://www.ubuntu.com/usn/USN-2202-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2196-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2198-1 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-2204-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2197-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2200-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2203-1 Third Party Advisory
http://secunia.com/advisories/59599 Broken Link
http://linux.oracle.com/errata/ELSA-2014-0771.html Third Party Advisory
http://secunia.com/advisories/59262 Broken Link
http://source.android.com/security/bulletin/2016-07-01.html Not Applicable
http://www.osvdb.org/106646 Broken Link
http://www.exploit-db.com/exploits/33516 Exploit Third Party Advisory VDB Entry
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html Third Party Advisory
http://secunia.com/advisories/59218 Not Applicable
History
Created Old Value New Value Data Type Notes
2022-05-10 17:19:30 Added to TrackCVE
2022-12-01 22:59:55 2014-05-07T10:55Z 2014-05-07T10:55:04 CVE Published Date updated
2022-12-01 22:59:55 2020-08-19T19:40:34 CVE Modified Date updated
2022-12-01 22:59:55 Analyzed Vulnerability Status updated
2023-02-13 01:04:46 2023-02-13T00:36:17 CVE Modified Date updated
2023-02-13 01:04:46 Analyzed Modified Vulnerability Status updated