CVE-2014-0196

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &...

Basic Information

CVE State
PUBLISHED
Reserved Date
December 03, 2013
Published Date
May 07, 2014
Last Updated
February 07, 2025
Vendor
n/a
Product
n/a
Description
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS Scores

CVSS v3.1

5.5 - MEDIUM

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

SSVC Information

Exploitation
active
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (added 2023-05-12 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2014-05-13 12:34:51 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-05-12 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

tempbottle/CVE-2014-0196

Type: github • Created: 2014-12-17 07:39:00 UTC • Stars: 3

CVE-2014-0196: Linux kernel pty layer race condition memory corruption

SunRain/CVE-2014-0196

Type: github • Created: 2014-05-13 12:34:51 UTC • Stars: 0