发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:06

[原文]User-mode Linux (UML) 2.4.17-8 does not restrict access to kernel address space, which allows local users to execute arbitrary code.

[CNNVD]User-Mode Linux内核内存访问漏洞(CNNVD-200212-352)

        User-mode Linux (UML) 2.4.17-8不限制内核地址空间的访问,本地用户可以利用该漏洞执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  XF  uml-kernel-memory-access(8005)
(UNKNOWN)  BID  3973
(UNKNOWN)  BUGTRAQ  20020128 user-mode-linux problems

- 漏洞信息

User-Mode Linux内核内存访问漏洞
高危 设计错误
2002-12-31 00:00:00 2005-10-20 00:00:00
        User-mode Linux (UML) 2.4.17-8不限制内核地址空间的访问,本地用户可以利用该漏洞执行任意代码。

- 公告与补丁

        This vulnerability has been acknowledged by the User-Mode Linux team, and kernel memory protection should be fully implemented in a future version of the product.
        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: .

- 漏洞信息 (21248)

User-Mode Linux Kernel 2.4.17 -8 Memory Access Vulnerability (EDBID:21248)
linux local
2000-08-25 Verified
0 Andrew Griffiths
N/A [点击下载]

User-Mode Linux (UML) is a patch which allows the Linux Kernel to run as a user space process. It is currently available for the Linux operating system. It may be used as an efficient tool for kernel development, as well as for virtual networking, honeypots, and experimentation.

UML does not correctly protect kernel address space from user programs within the UML environment. It may be possible to execute arbitrary code within the kernel and gain root access. Additionally, it may be possible to use this vulnerability to escape the UML environment, leading to local access on the hosting system.

This is a known problem with the current UML implementation. Memory protection may be partially implemented at this time.		

- 漏洞信息

User-mode Linux (UML) Kernel Address Space Access Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2002-01-28 Unknow
2002-01-28 Unknow

- 解决方案

Upgrade to version 2.4.17-9 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete