CVE-2008-0600

EXPLOITED

Linux Kernel - Code Injection

Title source: rule

Description

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Exploits (2)

exploitdb WORKING POC VERIFIED
by qaaz · clocallinux
https://www.exploit-db.com/exploits/5092
exploitdb WORKING POC VERIFIED
by qaaz · clocallinux
https://www.exploit-db.com/exploits/5093

Scores

EPSS 0.0028
EPSS Percentile 50.9%

Exploitation Intel

VulnCheck KEV 2010-08-12

Classification

CWE
CWE-94
Status draft

Affected Products (50)

linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
... and 35 more

Timeline

Published Feb 12, 2008
Tracked Since Feb 18, 2026