Vulnerability Details : CVE-2015-3288
mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
Vulnerability category: Denial of service
Products affected by CVE-2015-3288
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Threat overview for CVE-2015-3288
Top countries where our scanners detected CVE-2015-3288
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2015-3288 36,505
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-3288!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-3288
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3288
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2015-3288
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3288
-
https://source.android.com/security/bulletin/2017-01-01.html
Android Security Bulletin—January 2017 | Android Open Source ProjectThird Party Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b7339f4c31ad69c8e9c0b2859276e22cf72176d
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
https://security-tracker.debian.org/tracker/CVE-2015-3288
CVE-2015-3288Third Party Advisory
-
http://www.securityfocus.com/bid/93591
Linux Kernel 'mm/memory.c' Local Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
https://github.com/torvalds/linux/commit/6b7339f4c31ad69c8e9c0b2859276e22cf72176d
mm: avoid setting up anonymous pages into file mapping · torvalds/linux@6b7339f · GitHubVendor Advisory
-
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.4
Release Notes;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1333830
1333830 – (CVE-2015-3288) CVE-2015-3288 kernel: zero page memory arbitrary modificationIssue Tracking;Patch;Third Party Advisory;VDB Entry
Jump to