The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
Exploitability Analysis: Local
A vulnerability exploitable with only local access requires the attacker to have either
physical access to the vulnerable system or a local (shell) account. Examples of locally
exploitable vulnerabilities are peripheral attacks such as Firewire/USB DMA attacks, and
local privilege escalations (e.g., sudo).
Exploitability Complexity: Medium
The access conditions are somewhat specialized; the following are examples:
The attacking party is limited to a group of systems or users at some level of authorization, possibly untrusted.
Some information must be gathered before a successful attack can be launched.
The affected configuration is non-default, and is not commonly configured (e.g., a vulnerability present when a
server performs user account authentication via a specific scheme, but not present for another authentication scheme).
The attack requires a small amount of social engineering that might occasionally fool cautious users (e.g.,
phishing attacks that modify a web browser’s status bar to show a false link, having to be on someone’s “buddy”
list before sending an IM exploit).
Authentication is not required to access and exploit the vulnerability.
Confidentiality Impact: None
There is no impact to the confidentiality of the system.
Integrity Impact: None
There is no impact to the integrity of the system.
Availability Impact: Partial
There is reduced performance or interruptions in resource availability. An example is
a network-based flood attack that permits a limited number of successful connections
to an Internet service.