CVE-2013-6282

Scores

EPSS

0.676medium67.7%
0%20%40%60%80%100%

Percentile: 67.7%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-20

Exploits

Exploit ID: CVE-2013-6282

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 31574

Source: exploitdb

URL: https://www.exploit-db.com/exploits/31574

Exploit ID: 40975

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40975

Vulnerable Software (53)

Type: Configuration

Product: linux

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu utopic 14.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu vivid 15.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu wily 15.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu yakkety 16.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu zesty 17.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: debian

Trait:
{  "fixed": "3.6.4-1~experimental.1"}

Source: debian

Type: Configuration

Product: linux

Operating System: debian wheezy 7

Trait:
{  "fixed": "3.2.53-1"}

Source: debian

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: linux-aws

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux-aws

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux-flo

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux-flo

Operating System: ubuntu utopic 14.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux-flo

Operating System: ubuntu vivid 15.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux-flo

Operating System: ubuntu wily 15.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux-flo

Operating System: ubuntu xenial 16.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux-flo

Operating System: ubuntu yakkety 16.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: linux-gke

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux-goldfish

Operating System: ubuntu vivid 15.04

Trait:
{  "unaffected": true}

Source: ubuntu