Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-1828

Опубликовано: 22 мар. 2013
Источник: nvd
CVSS2: 6.9
EPSS Низкий

Описание

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 3.8 (включая) до 3.8.4 (исключая)

EPSS

Процентиль: 40%
0.00181
Низкий

6.9 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

redhat
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

debian
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the L ...

github
больше 3 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

EPSS

Процентиль: 40%
0.00181
Низкий

6.9 Medium

CVSS2

Дефекты

CWE-20