Vulnerability Details : CVE-2014-5045
The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-5045
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-5045
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.2
|
MEDIUM | AV:L/AC:H/Au:N/C:C/I:C/A:C |
1.9
|
10.0
|
NIST |
CWE ids for CVE-2014-5045
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5045
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=295dc39d941dc2ae53d5c170365af4c9d5c16212
kernel/git/torvalds/linux.git - Linux kernel source treeExploit;Patch;Vendor Advisory
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
Patch;Third Party Advisory;Vendor Advisory
-
http://secunia.com/advisories/60353
Sign inThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0062.html
RHSA-2015:0062 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/68862
Linux Kernel CVE-2014-5045 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=1122472
1122472 – (CVE-2014-5045) CVE-2014-5045 kernel: vfs: refcount issues during unmount on symlinkIssue Tracking;Third Party Advisory
-
https://github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212
fs: umount on symlink leaks mnt count · torvalds/linux@295dc39 · GitHubExploit;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/07/24/2
oss-security - Re: CVE request: kernel: vfs: refcount issues during unmount on symlinkMailing List;Third Party Advisory
Products affected by CVE-2014-5045
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*