Vulnerability Details : CVE-2009-3620
The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2009-3620
- cpe:2.3:a:redhat:mrg_realtime:1.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
Threat overview for CVE-2009-3620
Top countries where our scanners detected CVE-2009-3620
Top open port discovered on systems with this issue
52869
IPs affected by CVE-2009-3620 235,060
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-3620!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-3620
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-3620
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2009-3620
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
-
The product uses or accesses a resource that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3620
-
http://www.ubuntu.com/usn/usn-864-1
USN-864-1: Linux kernel vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html
[SECURITY] Fedora 10 Update: kernel-2.6.27.38-170.2.113.fc10Mailing List;Release Notes
-
https://bugzilla.redhat.com/show_bug.cgi?id=529597
529597 – (CVE-2009-3620) CVE-2009-3620 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialisedIssue Tracking
-
http://www.securityfocus.com/bid/36824
Broken Link;Third Party Advisory;VDB Entry
-
http://article.gmane.org/gmane.linux.kernel/892259
Broken Link
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:088
mandriva.comBroken Link
-
http://www.redhat.com/support/errata/RHSA-2009-1671.html
SupportBroken Link
-
http://www.vupen.com/english/advisories/2010/0528
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20Mailing List
-
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
502 Bad GatewayBroken Link
-
https://rhn.redhat.com/errata/RHSA-2009-1540.html
RHSA-2009:1540 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2009:064) - openSUSE Security Announce - openSUSE Mailing ListsMailing List
-
http://secunia.com/advisories/36707
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7dc482dfeeeefcfd000d4271c4626937406756d7
Broken Link
-
http://secunia.com/advisories/38794
About Secunia Research | FlexeraBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20Mailing List
-
http://www.redhat.com/support/errata/RHSA-2009-1670.html
SupportBroken Link
-
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log
404: File not foundBroken Link;Patch
-
http://secunia.com/advisories/38834
About Secunia Research | FlexeraBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2009:061) - openSUSE Security Announce - openSUSE Mailing ListsMailing List
-
http://www.openwall.com/lists/oss-security/2009/10/19/3
oss-security - Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialisedMailing List;Patch
-
http://secunia.com/advisories/37909
About Secunia Research | FlexeraBroken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763
404 Not FoundBroken Link
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
mandriva.comBroken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891
404 Not FoundBroken Link
-
http://www.openwall.com/lists/oss-security/2009/10/19/1
oss-security - CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialisedMailing List;Patch
-
http://www.redhat.com/support/errata/RHSA-2010-0882.html
SupportBroken Link
Jump to