Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2009-4271

Disclosure Date: March 19, 2010
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The Linux kernel 2.6.9 through 2.6.17 on the x86_64 and amd64 platforms allows local users to cause a denial of service (panic) via a 32-bit application that calls mprotect on its Virtual Dynamic Shared Object (VDSO) page and then triggers a segmentation fault.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • linux

Products

  • linux kernel 2.6.10,
  • linux kernel 2.6.11,
  • linux kernel 2.6.11.1,
  • linux kernel 2.6.11.10,
  • linux kernel 2.6.11.11,
  • linux kernel 2.6.11.12,
  • linux kernel 2.6.11.2,
  • linux kernel 2.6.11.3,
  • linux kernel 2.6.11.4,
  • linux kernel 2.6.11.5,
  • linux kernel 2.6.11.6,
  • linux kernel 2.6.11.7,
  • linux kernel 2.6.11.8,
  • linux kernel 2.6.11.9,
  • linux kernel 2.6.12,
  • linux kernel 2.6.12.1,
  • linux kernel 2.6.12.2,
  • linux kernel 2.6.12.3,
  • linux kernel 2.6.12.4,
  • linux kernel 2.6.12.5,
  • linux kernel 2.6.12.6,
  • linux kernel 2.6.13,
  • linux kernel 2.6.13.1,
  • linux kernel 2.6.13.2,
  • linux kernel 2.6.13.3,
  • linux kernel 2.6.13.4,
  • linux kernel 2.6.13.5,
  • linux kernel 2.6.14,
  • linux kernel 2.6.14.1,
  • linux kernel 2.6.14.2,
  • linux kernel 2.6.14.3,
  • linux kernel 2.6.14.4,
  • linux kernel 2.6.14.5,
  • linux kernel 2.6.14.6,
  • linux kernel 2.6.14.7,
  • linux kernel 2.6.15,
  • linux kernel 2.6.15.1,
  • linux kernel 2.6.15.2,
  • linux kernel 2.6.15.3,
  • linux kernel 2.6.15.4,
  • linux kernel 2.6.15.5,
  • linux kernel 2.6.15.6,
  • linux kernel 2.6.15.7,
  • linux kernel 2.6.16,
  • linux kernel 2.6.16.1,
  • linux kernel 2.6.16.10,
  • linux kernel 2.6.16.11,
  • linux kernel 2.6.16.12,
  • linux kernel 2.6.16.13,
  • linux kernel 2.6.16.14,
  • linux kernel 2.6.16.15,
  • linux kernel 2.6.16.16,
  • linux kernel 2.6.16.17,
  • linux kernel 2.6.16.18,
  • linux kernel 2.6.16.19,
  • linux kernel 2.6.16.2,
  • linux kernel 2.6.16.20,
  • linux kernel 2.6.16.21,
  • linux kernel 2.6.16.22,
  • linux kernel 2.6.16.23,
  • linux kernel 2.6.16.24,
  • linux kernel 2.6.16.25,
  • linux kernel 2.6.16.26,
  • linux kernel 2.6.16.27,
  • linux kernel 2.6.16.28,
  • linux kernel 2.6.16.29,
  • linux kernel 2.6.16.3,
  • linux kernel 2.6.16.30,
  • linux kernel 2.6.16.31,
  • linux kernel 2.6.16.32,
  • linux kernel 2.6.16.33,
  • linux kernel 2.6.16.34,
  • linux kernel 2.6.16.35,
  • linux kernel 2.6.16.36,
  • linux kernel 2.6.16.37,
  • linux kernel 2.6.16.38,
  • linux kernel 2.6.16.39,
  • linux kernel 2.6.16.4,
  • linux kernel 2.6.16.40,
  • linux kernel 2.6.16.41,
  • linux kernel 2.6.16.42,
  • linux kernel 2.6.16.43,
  • linux kernel 2.6.16.44,
  • linux kernel 2.6.16.45,
  • linux kernel 2.6.16.46,
  • linux kernel 2.6.16.47,
  • linux kernel 2.6.16.48,
  • linux kernel 2.6.16.49,
  • linux kernel 2.6.16.5,
  • linux kernel 2.6.16.50,
  • linux kernel 2.6.16.51,
  • linux kernel 2.6.16.52,
  • linux kernel 2.6.16.53,
  • linux kernel 2.6.16.54,
  • linux kernel 2.6.16.55,
  • linux kernel 2.6.16.56,
  • linux kernel 2.6.16.57,
  • linux kernel 2.6.16.58,
  • linux kernel 2.6.16.59,
  • linux kernel 2.6.16.6,
  • linux kernel 2.6.16.60,
  • linux kernel 2.6.16.61,
  • linux kernel 2.6.16.62,
  • linux kernel 2.6.16.7,
  • linux kernel 2.6.16.8,
  • linux kernel 2.6.16.9,
  • linux kernel 2.6.17,
  • linux kernel 2.6.9
Technical Analysis