Описание
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | librdmacm | Not affected | ||
Red Hat Enterprise Linux 6 | ibutils | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | infinipath-psm | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | libibverbs | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | libmlx4 | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | librdmacm | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | mpitests | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | mstflint | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | openmpi | Fixed | RHSA-2013:1661 | 20.11.2013 |
Red Hat Enterprise Linux 6 | perftest | Fixed | RHSA-2013:1661 | 20.11.2013 |
Показывать по
Дополнительная информация
Статус:
EPSS
1.2 Low
CVSS2
Связанные уязвимости
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6 ...
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
ELSA-2013-1661: rdma stack security, bug fix, and enhancement update (MODERATE)
EPSS
1.2 Low
CVSS2