CVE-2012-0056

Scores

EPSS

0.781medium78.1%
0%20%40%60%80%100%

Percentile: 78.1%

CVSS

7.2high2.0
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc//mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-264CWE-863

Exploits

Exploit ID: 18411

Source: exploitdb

URL: https://www.exploit-db.com/exploits/18411

Exploit ID: 35161

Source: exploitdb

URL: https://www.exploit-db.com/exploits/35161

Exploit ID: CVE-2012-0056

Source: github-poc

URL: https://github.com/pythonone/CVE-2012-0056

Recommendations

Source: nvd

Apply an updatePatch commit e268337dfe26dfc7efd422a804dbb27977a3cccc has been provided by Linus Torvalds to address this vulnerability. Kernel image 3.0.18 and 3.2.2 have included this commit so far.Users who obtain the Linux kernel from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors.

URL: http://www.kb.cert.org/vuls/id/470151

Vulnerable Software (56)

Type: Configuration

Product: kernel

Operating System: rhel 6

Trait:
{  "fixed": "2.6.32-220.4.1.el6"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "3.0.9-rt26.46.el6rt"}

Source: redhat

Type: Configuration

Product: linux

Operating System: ubuntu hardy 8.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu utopic 14.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu vivid 15.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu wily 15.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu yakkety 16.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu zesty 17.04

Trait:
{  "unaffected": true}

Source: ubuntu