Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-0038

EPSS 51.52% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-0038

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel‘compat_sys_recvmmsg’函数输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Linux kernel 3.13.1及之前的版本中的net/compat.c文件中的‘compat_sys_recvmmsg’函数中存在输入验证漏洞。当内核配置选项设置为‘CONFIG_X86_X32’时,本地攻击者可通过带有‘timeout pointer’参数的recvmmsg系统调用利用该漏洞获取特权。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-0038

#POC DescriptionSource LinkShenlong Link
1Linux local root exploit for CVE-2014-0038https://github.com/saelo/cve-2014-0038POC Details
2SNP Assignment 1 Report - Linux box exploitation ( Vulnerability CVE-2014-0038)https://github.com/kiruthikan99/IT19115276POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-0038

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-02-06 · 48 CVEs total

CVE-2014-1481多款Mozilla产品权限许可和访问控制漏洞
CVE-2014-1487多款Mozilla产品信任管理问题漏洞
CVE-2014-1478Mozilla Firefox/SeaMonkey 内存损坏漏洞
CVE-2014-1485Mozilla Firefox/SeaMonkey 安全漏洞
CVE-2014-1488Mozilla Firefox/SeaMonkey 资源管理错误漏洞
CVE-2014-1489Mozilla Firefox 权限许可和访问控制漏洞
CVE-2014-1490Mozilla Network Security Services 竞争条件漏洞
CVE-2014-1491Mozilla Network Security Services 加密问题漏洞
CVE-2014-1484Mozilla Firefox 信息泄露漏洞
CVE-2014-1482多款Mozilla产品‘RasterImage.cpp’文件权限许可和访问控制问题漏洞
CVE-2014-1486多款Mozilla产品‘imgRequestProxy’函数释放后重用漏洞
CVE-2014-1479多款Mozilla产品权限许可和访问控制问题漏洞
CVE-2014-1477多款Mozilla产品浏览器引擎安全漏洞
CVE-2014-0020Pidgin libpurple IRC协议插件输入验证漏洞
CVE-2013-7321D-Link DAP-2553 Access Point 跨站脚本漏洞
CVE-2013-7320D-Link DAP-2253 Access Point 跨站请求伪造漏洞
CVE-2013-7319WordPress Download Manager 跨站脚本漏洞
CVE-2013-6486Pidgin‘gtkutils.c’文件输入验证漏洞
CVE-2013-6485Pidgin libpurple‘util.c’文件缓冲区溢出漏洞
CVE-2013-6484Pidgin libpurple STUN协议输入验证漏洞

Showing top 20 of 48 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-0038

No comments yet


Leave a comment