Be in love with vulnerability scanning

Mageni is a powerful and easy vulnerability scanner used by companies of all sizes. You will be in love with Mageni's powerful features, ease of use and price. Free for 7-days then $39 monthly for infinite IPs.

Start now 

No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.

App screenshot

CVE-2009-0342

CVE information

Published

13 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall..

CVSSv2.0 Score

Severity
High
Base Score
7.2/10
Exploit Score
3.9/10
Access Vector
Local
Access Complexity
Low
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:provos:systrace:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.6a:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.6d:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.6b:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:provos:systrace:1.6c:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:linux:linux_kernel:_nil_:_nil_:x86_64:*:*:*:*:*
  No
-

Every 11 seconds there is a ransomware attack.

Mageni can help you manage this threat by understanding your vulnerabilities and prioritizing the remediation.

Sign up for free