CVE-2014-0196 Detail Current Description The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

View Analysis Description Analysis Description The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. Severity CVSS Version 3.x CVSS Version 2.0



CVSS 3.x Severity and Metrics:

NIST: NVD Base Score: N/A NVD score not yet provided. CVSS 2.0 Severity and Metrics:



NIST: NVD Base Score: 6.9 MEDIUM Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C) Weakness Enumeration CWE-ID CWE Name Source CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') NIST Known Affected Software Configurations Switch to CPE 2.2 CPEs loading, please wait. Denotes Vulnerable Software

Are we missing a CPE here? Please let us know.

Change History 4 change records found show changes Modified Analysis 8/19/2020 3:40:35 PM Action Type Old Value New Value Added CPE Configuration Record truncated, showing 500 of 2231 characters.

View Entire Change Record

OR *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 11.1.0 up to (including) 11.5.1 *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 11.3.0 up to (including) 11.5.1 *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 11.1.0 up to (including) 11.5.1 *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 11.4.0 up to (including) 11.5.1 * Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*



Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*



Added CPE Configuration OR *cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*



Added CPE Configuration OR *cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*



Added CPE Configuration OR *cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:* *cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:* *cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*



Changed CPE Configuration Record truncated, showing 500 of 20963 characters.

View Entire Change Record

OR *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:* OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (including) 3.14.3



Changed Reference Type http://bugzilla.novell.com/show_bug.cgi?id=875690 No Types Assigned



http://bugzilla.novell.com/show_bug.cgi?id=875690 Permissions Required, Third Party Advisory



Changed Reference Type http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00 No Types Assigned



http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00 Exploit, Mailing List, Patch, Vendor Advisory



Changed Reference Type http://linux.oracle.com/errata/ELSA-2014-0771.html No Types Assigned



http://linux.oracle.com/errata/ELSA-2014-0771.html Third Party Advisory



Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html No Types Assigned



http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html Mailing List, Third Party Advisory



Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html No Types Assigned



http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html Mailing List, Third Party Advisory



Changed Reference Type http://pastebin.com/raw.php?i=yTSFUBgZ No Types Assigned



http://pastebin.com/raw.php?i=yTSFUBgZ Exploit, Mailing List, Third Party Advisory



Changed Reference Type http://rhn.redhat.com/errata/RHSA-2014-0512.html No Types Assigned



http://rhn.redhat.com/errata/RHSA-2014-0512.html Third Party Advisory



Changed Reference Type http://secunia.com/advisories/59218 No Types Assigned



http://secunia.com/advisories/59218 Not Applicable



Changed Reference Type http://secunia.com/advisories/59262 No Types Assigned



http://secunia.com/advisories/59262 Broken Link



Changed Reference Type http://secunia.com/advisories/59599 No Types Assigned



http://secunia.com/advisories/59599 Broken Link



Changed Reference Type http://source.android.com/security/bulletin/2016-07-01.html No Types Assigned



http://source.android.com/security/bulletin/2016-07-01.html Not Applicable



Changed Reference Type http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html No Types Assigned



http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html Third Party Advisory



Changed Reference Type http://www.debian.org/security/2014/dsa-2926 No Types Assigned



http://www.debian.org/security/2014/dsa-2926 Third Party Advisory



Changed Reference Type http://www.debian.org/security/2014/dsa-2928 No Types Assigned



http://www.debian.org/security/2014/dsa-2928 Third Party Advisory



Changed Reference Type http://www.exploit-db.com/exploits/33516 No Types Assigned



http://www.exploit-db.com/exploits/33516 Exploit, Third Party Advisory, VDB Entry



Changed Reference Type http://www.openwall.com/lists/oss-security/2014/05/05/6 No Types Assigned



http://www.openwall.com/lists/oss-security/2014/05/05/6 Mailing List, Third Party Advisory



Changed Reference Type http://www.osvdb.org/106646 No Types Assigned



http://www.osvdb.org/106646 Broken Link



Changed Reference Type http://www.ubuntu.com/usn/USN-2196-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2196-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2197-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2197-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2198-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2198-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2199-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2199-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2200-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2200-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2201-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2201-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2202-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2202-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2203-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2203-1 Third Party Advisory



Changed Reference Type http://www.ubuntu.com/usn/USN-2204-1 No Types Assigned



http://www.ubuntu.com/usn/USN-2204-1 Third Party Advisory



Changed Reference Type https://bugzilla.redhat.com/show_bug.cgi?id=1094232 No Types Assigned



https://bugzilla.redhat.com/show_bug.cgi?id=1094232 Issue Tracking, Patch, Third Party Advisory



Changed Reference Type https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 No Types Assigned



https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 Exploit, Patch, Third Party Advisory



CVE Modified by MITRE 1/06/2017 9:59:19 PM Action Type Old Value New Value Added Reference http://secunia.com/advisories/59218 [No Types Assigned]



Added Reference http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html [No Types Assigned]



Added Reference http://www.exploit-db.com/exploits/33516 [No Types Assigned]



Added Reference http://www.osvdb.org/106646 [No Types Assigned]



CVE Modified by Source 7/11/2016 9:59:01 PM Action Type Old Value New Value Added Reference http://source.android.com/security/bulletin/2016-07-01.html



Initial CVE Analysis 5/07/2014 11:6:06 AM Action Type Old Value New Value Quick Info CVE Dictionary Entry:

CVE-2014-0196

NVD Published Date:

05/07/2014

NVD Last Modified:

08/19/2020

Source:

MITRE

