Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4516

Опубликовано: 22 окт. 2012
Источник: debian
EPSS Низкий

Описание

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
librdmacmfixed1.0.16-1package
librdmacmnot-affectedsqueezepackage
librdmacmfixed1.0.15-1+deb7u1wheezypackage

EPSS

Процентиль: 60%
0.00399
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

redhat
почти 13 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

nvd
почти 13 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

github
больше 3 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

oracle-oval
больше 11 лет назад

ELSA-2013-1661: rdma stack security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 60%
0.00399
Низкий