⚠ Actively exploited
Added to CISA KEV on 2023-05-12. Federal agencies required to patch by 2023-06-02. Required action: The impacted product is end-of-life and should be disconnected if still in use..
CVE-2014-0196
Severity
5.5MEDIUM
EPSS
48.6%
top 2.25%
CISA KEV
KEV
Added 2023-05-12
Due 2023-06-02
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 7
KEV addedMay 12
KEV dueJun 2
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.
Description
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages26 packages
Also affects: Debian Linux 6.0, 7.0, Ubuntu Linux 10.04, 12.04, 12.10, 13.10, 14.04, Enterprise Linux 6.0, 6.3, 6.4
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
1Exploit-DB▶
Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation↗2014-05-26