CVE-2014-2851

Public Exploit

Description

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

Category

6.9
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 0.33%
Vendor Advisory debian.org Vendor Advisory kernel.org Vendor Advisory lkml.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac exploit patch vendor advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1086730 issue tracking third party advisory patch
http://www.securitytracker.com/id/1030769 vdb entry third party advisory
http://secunia.com/advisories/59386 third party advisory broken link
https://lkml.org/lkml/2014/4/10/736 mailing list patch vendor advisory
http://secunia.com/advisories/59599 third party advisory broken link
http://www.debian.org/security/2014/dsa-2926 third party advisory vendor advisory
http://www.securityfocus.com/bid/66779 vdb entry third party advisory
http://www.openwall.com/lists/oss-security/2014/04/11/4 mailing list third party advisory patch

Frequently Asked Questions

What is the severity of CVE-2014-2851?
CVE-2014-2851 has been scored as a medium severity vulnerability.
How to fix CVE-2014-2851?
To fix CVE-2014-2851, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2014-2851 being actively exploited in the wild?
It is possible that CVE-2014-2851 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.