CVE-2009-1439
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
27/04/2009
Last modified:
09/04/2025
Description
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (including) | |
cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.fefe.de/?ts=b72905a8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Db363b3304bcf68c4541683b2eff70b29f0446a5b
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html
- http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html
- http://secunia.com/advisories/34981
- http://secunia.com/advisories/35011
- http://secunia.com/advisories/35120
- http://secunia.com/advisories/35121
- http://secunia.com/advisories/35185
- http://secunia.com/advisories/35217
- http://secunia.com/advisories/35226
- http://secunia.com/advisories/35343
- http://secunia.com/advisories/35387
- http://secunia.com/advisories/35390
- http://secunia.com/advisories/35394
- http://secunia.com/advisories/35656
- http://secunia.com/advisories/37471
- http://wiki.rpath.com/Advisories:rPSA-2009-0084
- http://www.debian.org/security/2009/dsa-1787
- http://www.debian.org/security/2009/dsa-1794
- http://www.debian.org/security/2009/dsa-1800
- http://www.openwall.com/lists/oss-security/2009/04/04/1
- http://www.openwall.com/lists/oss-security/2009/04/07/3
- http://www.openwall.com/lists/oss-security/2009/04/07/7
- http://www.redhat.com/support/errata/RHSA-2009-1081.html
- http://www.securityfocus.com/archive/1/503610/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/34453
- http://www.ubuntu.com/usn/usn-793-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
- http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/
- https://bugzilla.novell.com/show_bug.cgi?id=492282
- https://bugzilla.redhat.com/show_bug.cgi?id=494275
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html
- http://blog.fefe.de/?ts=b72905a8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Db363b3304bcf68c4541683b2eff70b29f0446a5b
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html
- http://lists.samba.org/archive/linux-cifs-client/2009-April/004322.html
- http://secunia.com/advisories/34981
- http://secunia.com/advisories/35011
- http://secunia.com/advisories/35120
- http://secunia.com/advisories/35121
- http://secunia.com/advisories/35185
- http://secunia.com/advisories/35217
- http://secunia.com/advisories/35226
- http://secunia.com/advisories/35343
- http://secunia.com/advisories/35387
- http://secunia.com/advisories/35390
- http://secunia.com/advisories/35394
- http://secunia.com/advisories/35656
- http://secunia.com/advisories/37471
- http://wiki.rpath.com/Advisories:rPSA-2009-0084
- http://www.debian.org/security/2009/dsa-1787
- http://www.debian.org/security/2009/dsa-1794
- http://www.debian.org/security/2009/dsa-1800
- http://www.openwall.com/lists/oss-security/2009/04/04/1
- http://www.openwall.com/lists/oss-security/2009/04/07/3
- http://www.openwall.com/lists/oss-security/2009/04/07/7
- http://www.redhat.com/support/errata/RHSA-2009-1081.html
- http://www.securityfocus.com/archive/1/503610/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/34453
- http://www.ubuntu.com/usn/usn-793-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
- http://xorl.wordpress.com/2009/04/07/linux-kernel-tree-connect-cifs-remote-buffer-overflow/
- https://bugzilla.novell.com/show_bug.cgi?id=492282
- https://bugzilla.redhat.com/show_bug.cgi?id=494275
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10321
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8265
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html