Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3520

Опубликовано: 21 авг. 2012
Источник: redhat
CVSS2: 4.4
EPSS Низкий

Описание

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.

Отчет

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6 as they did not backport the commit that introduced this issue. Future kernel updates for Red Hat Enterprise MRG 2 may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2012:149104.12.2012

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=850449kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing

EPSS

Процентиль: 25%
0.00085
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.

nvd
больше 13 лет назад

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.

debian
больше 13 лет назад

The Netlink implementation in the Linux kernel before 3.2.30 does not ...

github
больше 3 лет назад

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.

fstec
около 11 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 25%
0.00085
Низкий

4.4 Medium

CVSS2