CVE-2014-9645
Summary
| CVE | CVE-2014-9645 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-12 06:59:00 UTC |
| Updated | 2019-04-03 15:29:00 UTC |
| Description | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 1185707 – (CVE-2014-9645) CVE-2014-9645 busybox: unprivileged arbitrary module load via basename abuse | CONFIRM | bugzilla.redhat.com | Issue Tracking |
| [SECURITY] [DLA 1445-1] busybox security update | MLIST | lists.debian.org | |
| 7652 – modprobe wrongly accepts paths as module names | CONFIRM | bugs.busybox.net | Issue Tracking |
| The upcoming Linux kernel v3.19 will contain a fix for a vulnerability in the… | MISC | plus.google.com | Patch, Third Party Advisory |
| USN-3935-1: BusyBox vulnerabilities | Ubuntu security notices | Ubuntu | UBUNTU | usn.ubuntu.com | |
| BusyBox: Multiple vulnerabilities (GLSA 201503-13) — Gentoo security | GENTOO | security.gentoo.org | |
| Full Disclosure: SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client | FULLDISC | seclists.org | |
| oss-security - Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load | MLIST | openwall.com | Mailing List, Patch, Third Party Advisory |
| BusyBox CVE-2014-9645 Local Security Bypass Vulnerability | BID | www.securityfocus.com | |
| busybox - BusyBox: The Swiss Army Knife of Embedded Linux | CONFIRM | git.busybox.net | Issue Tracking, Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.