Vigil@nce - Linux kernel: information disclosure about keyboard
November 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can read files of /proc or /dev, in order to
obtain information about keys pressed by other users.
Severity: 1/4
Creation date: 08/11/2011
IMPACTED PRODUCTS
– Linux kernel
DESCRIPTION OF THE VULNERABILITY
Three vulnerabilities can be used by a local attacker to obtain
information on pressed keys.
An attacker can read the number of keybord interruptions indicated
in /proc/interrupts, in order to guess the number of pressed keys.
[severity:1/4]
An attacker can monitor the changing time of /dev/pts/ and
/dev/tty*, in order to guess the number of pressed keys.
[severity:1/4]
An attacker can read the number of Scheduler events indicated in
/proc/$PID/sched, in order to guess the number of pressed keys.
[severity:1/4]
A local attacker can therefore read files of /proc or /dev, in
order to obtain information about keys pressed by other users.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131