Vulnerability Details : CVE-2009-1185
Public exploit exists!
udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
Threat overview for CVE-2009-1185
Top countries where our scanners detected CVE-2009-1185
Top open port discovered on systems with this issue
5555
IPs affected by CVE-2009-1185 104
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-1185!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-1185
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 13 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2009-1185
-
Linux udev Netlink Local Privilege Escalation
Disclosure Date: 2009-04-16First seen: 2020-04-26exploit/linux/local/udev_netlinkVersions of udev < 1.4.1 do not verify that netlink messages are coming from the kernel. This allows local users to gain privileges by sending netlink messages from userland. Authors: - kcope - Jon Oberheide - egypt <egypt@metasploit.com>
CVSS scores for CVE-2009-1185
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2009-1185
-
The product does not properly verify that the source of data or communication is valid.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-1185
-
Red Hat 2009-04-20This issue has been fixed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2009-0427.html . udev packages as shipped in Red Hat Enterprise Linux 4 were not affected by this flaw, as they do not use netlink sockets for communication. udev is not shipped in Red Hat Enterprise Linux 2.1 and 3.
-
http://www.securityfocus.com/bid/34536
udev Netlink Message Validation Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e2b362d9f23d4c63018709ab5f81a02f72b91e75
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.446399
Mailing List;Third Party Advisory
-
http://lists.vmware.com/pipermail/security-announce/2009/000060.html
502 Bad GatewayThird Party Advisory
-
http://www.debian.org/security/2009/dsa-1772
Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00462.html
Mailing List;Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5975
Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPViewThird Party Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200904-18.xml
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html
Mailing List;Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00463.html
Mailing List;Third Party Advisory
-
http://www.securityfocus.com/archive/1/502752/100/0/threaded
Third Party Advisory;VDB Entry
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
Juniper Networks - 2015-07 Security Bulletin: CTPView: Multiple vulnerabilities in CTPViewThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.html
Mailing List;Third Party Advisory
-
http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=e86a923d508c2aed371cdd958ce82489cf2ab615
-
https://www.exploit-db.com/exploits/8572
Exploit;Third Party Advisory;VDB Entry
-
http://www.redhat.com/support/errata/RHSA-2009-0427.html
Third Party Advisory
-
http://wiki.rpath.com/Advisories:rPSA-2009-0063
Broken Link
-
https://bugzilla.redhat.com/show_bug.cgi?id=495051
Issue Tracking;Patch;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:103
Broken Link
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0063
Broken Link
-
http://www.securityfocus.com/archive/1/504849/100/0/threaded
Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id?1022067
Broken Link;Third Party Advisory;VDB Entry
-
http://www.vmware.com/security/advisories/VMSA-2009-0009.html
VMSA-2009-0009Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/1865
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required
-
http://www.vupen.com/english/advisories/2009/1053
Permissions Required
-
http://www.ubuntu.com/usn/usn-758-1
Third Party Advisory
-
https://launchpad.net/bugs/cve/2009-1185
Issue Tracking;Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10925
Broken Link
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:104
Broken Link
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*
- cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*
- cpe:2.3:a:juniper:ctpview:7.1:r1:*:*:*:*:*:*
- cpe:2.3:a:juniper:ctpview:7.2:-:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
- cpe:2.3:a:udev_project:udev:*:*:*:*:*:*:*:*