CVE-2008-3911

EUVD-2008-3896
The proc_do_xprt function in net/sunrpc/sysctl.c in the Linux kernel 2.6.26.3 does not check the length of a certain buffer obtained from userspace, which allows local users to overflow a stack-based buffer and have unspecified other impact via a crafted read system call for the /proc/sys/sunrpc/transports file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 14%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
2.6.26.3
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
dapper
dne
feisty
dne
gutsy
dne
hardy
not-affected
linux-source-2.6.15
dapper
not-affected
feisty
dne
gutsy
dne
hardy
dne
linux-source-2.6.20
dapper
dne
feisty
not-affected
gutsy
dne
hardy
dne
linux-source-2.6.22
dapper
dne
feisty
dne
gutsy
not-affected
hardy
dne