Vulnerability Details : CVE-2009-3080
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-3080
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 18 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-3080
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
[email protected] |
CWE ids for CVE-2009-3080
-
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.Assigned by: [email protected] (Primary)
References for CVE-2009-3080
-
http://www.ubuntu.com/usn/usn-864-1
Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
Mailing List;Third Party Advisory
-
https://rhn.redhat.com/errata/RHSA-2010-0046.html
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10989
Third Party Advisory
-
http://www.securityfocus.com/bid/37068
Third Party Advisory;VDB Entry
-
http://www.redhat.com/support/errata/RHSA-2010-0041.html
Broken Link
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=690e744869f3262855b83b4fb59199cf142765b0
-
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
Mailing List;Third Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2011-0009.html
Third Party Advisory
-
http://support.avaya.com/css/P8/documents/100073666
Third Party Advisory
-
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12862
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
Mailing List;Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00777.html
Mailing List;Third Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.32-rc8
Broken Link
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:030
Broken Link
-
http://www.debian.org/security/2010/dsa-2005
Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0882.html
Broken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7101
Third Party Advisory
Products affected by CVE-2009-3080
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora:10:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
- cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*