CVE-2009-2698
high-risk
Published 2009-08-27
The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
Do I need to act?
!
26.1% chance of exploitation in next 30 days
EPSS score — higher than 74% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
References (52)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1223.html
Broken Link
http://secunia.com/advisories/23073
Broken Link
http://secunia.com/advisories/36430
Broken Link
http://secunia.com/advisories/36510
Broken Link
http://secunia.com/advisories/37105
Broken Link
http://secunia.com/advisories/37298
Broken Link
http://secunia.com/advisories/37471
Third Party Advisory
http://support.avaya.com/css/P8/documents/100067254
Broken Link
http://www.securityfocus.com/bid/36108
Broken Link
http://www.securitytracker.com/id?1022761
Third Party Advisory
http://www.ubuntu.com/usn/USN-852-1
and 32 more references
66
/ 100
high-risk
Severity
24/34 · High
Exploitability
22/34 · High
Exposure
20/34 · Moderate