V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2009-3939
DEB
HighConfirmedExploit available

The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows loc…

CVSS
7.1
High
EPSS
0.00
p12
Published
2009-01-01
Updated
2009-01-01
Description

The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.

Tags · CWE
CWE-732
CAPEC-1
CAPEC-17
CAPEC-60
CAPEC-61
CAPEC-62
CAPEC-122
CAPEC-127
CAPEC-180
CAPEC-206
CAPEC-234
CAPEC-642
Affected products
Aura_application_enablement_servicesAura_communication_managerAura_session_managerAura_sip_enablement_servicesAura_system_managerAura_system_platformVoice_portal
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Timeline
2009-01-01
Published
2009-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: N
None (N)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.000 · p12
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-127 · CWE-732
└ via CAPEC-60 · CWE-732
└ via CAPEC-642 · CWE-732
└ via CAPEC-122 · CWE-732
└ via CAPEC-60 · CWE-732
└ via CAPEC-206 · CWE-732
└ via CAPEC-642 · CWE-732
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
kernelTracked
kernel-rtTracked
linuxTracked
linux-2.6Tracked
linux-2.6Tracked
linux-2.6.24Tracked
aura_application_enablement_services*Tracked
aura_communication_manager*Tracked
aura_session_manager*Tracked
aura_sip_enablement_services*Tracked
aura_system_manager*Tracked
aura_system_platform*Tracked
debian_linux*Tracked
enterprise_linux_desktop*Tracked
enterprise_linux_eus*Tracked
enterprise_linux_server*Tracked
enterprise_linux_workstation*Tracked
linux_enterprise_desktop*Tracked
linux_enterprise_server*Tracked
Source databases
DEB
CVE
RED
UBU
Related vulnerabilities