vendor:
Linux Kernel
by:
Vince Weaver
7.8
CVSS
HIGH
Buffer Overflow
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: Linux Kernel
Affected Version From: Linux 3.0.0
Affected Version To: Linux 3.0.0
Patch Exists: NO
Related CWE: N/A
CPE: o:linux:linux_kernel:3.0.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2012
Error with overflows and perf::perf_count_sw_cpu_clock
This test will crash Linux 3.0.0 by using a buffer overflow vulnerability. The exploit is triggered by a call to the perf_event_open() system call with a PERF_COUNT_SW_CPU_CLOCK configuration. This causes a SIGIO signal to be sent to the process, which is then handled by the our_handler() function. This function increments the total variable, which can be used to cause a crash.
Mitigation:
Ensure that all user input is properly validated and sanitized before being used in a system call.