CVE-2014-4027

CVSS V2 Low 2.3 CVSS V3 None
Description
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
Overview
  • CVE ID
  • CVE-2014-4027
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-06-23T11:21:18
  • Last Modified Date
  • 2020-08-21T18:24:46
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 3.14
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.6.0
cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 1 OR 11.3.0 11.6.0
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.6.0
cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 1 OR 11.4.0 11.6.0
cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.6.0
cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.3.0
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.6.0
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.6.0
cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.6.0
cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 1 OR 11.3.0 11.6.0
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.4.1
cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.3.0
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* 1 OR 11.1.0 11.3.0
cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.5.0
cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:* 1 OR 4.2.0 4.5.0
cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.5.0
cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* 1 OR 3.0.0 3.1.1
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:A/AC:M/Au:S/C:P/I:N/A:N
  • Access Vector
  • ADJACENT_NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 2.3
  • Severity
  • LOW
  • Exploitability Score
  • 4.4
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 17:19:13 Added to TrackCVE
2022-12-01 23:37:33 2014-06-23T11:21Z 2014-06-23T11:21:18 CVE Published Date updated
2022-12-01 23:37:33 2020-08-21T18:24:46 CVE Modified Date updated
2022-12-01 23:37:33 Analyzed Vulnerability Status updated