Description
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Exploits (3)
exploitdb
WORKING POC
by Matthew Daley · clocallinux_x86-64
https://www.exploit-db.com/exploits/33516
References (29)
Core 29
Core References
Broken Link vdb-entry
x_refsource_osvdb
http://www.osvdb.org/106646
Third Party Advisory, US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0196
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2200-1
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2203-1
Third Party Advisory x_refsource_confirm
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2014/05/05/6
Broken Link third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/59262
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2204-1
Not Applicable third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/59218
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2202-1
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/33516
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2014/dsa-2928
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2199-1
Third Party Advisory x_refsource_confirm
http://linux.oracle.com/errata/ELSA-2014-0771.html
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1094232
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2197-1
Not Applicable x_refsource_confirm
http://source.android.com/security/bulletin/2016-07-01.html
Third Party Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2014-0512.html
Broken Link third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/59599
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2014/dsa-2926
Exploit, Patch, Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://pastebin.com/raw.php?i=yTSFUBgZ
Broken Link x_refsource_confirm
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
Issue Tracking, Permissions Required, Third Party Advisory x_refsource_confirm
http://bugzilla.novell.com/show_bug.cgi?id=875690
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2198-1
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2201-1
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2196-1
Scores
CVSS v3
5.5
EPSS
0.4856
EPSS Percentile
97.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
active
Automatable
no
Technical Impact
partial
Details
CISA KEV
2023-05-12
VulnCheck KEV
2023-05-12
InTheWild.io
2023-05-12
ENISA EUVD
EUVD-2014-0247
CWE
CWE-362
Status
published
Products (38)
canonical/ubuntu_linux
10.04
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
12.10
canonical/ubuntu_linux
13.10
canonical/ubuntu_linux
14.04
debian/debian_linux
6.0
debian/debian_linux
7.0
f5/big-ip_access_policy_manager
11.1.0 - 11.5.1
f5/big-ip_advanced_firewall_manager
11.3.0 - 11.5.1
f5/big-ip_analytics
11.1.0 - 11.5.1
... and 28 more
Published
May 07, 2014
KEV Added
May 12, 2023
Tracked Since
Feb 18, 2026