Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-4516

Опубликовано: 08 окт. 2012
Источник: redhat
CVSS2: 1.2
EPSS Низкий

Описание

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5librdmacmNot affected
Red Hat Enterprise Linux 6ibutilsFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6infinipath-psmFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6libibverbsFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6libmlx4FixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6librdmacmFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6mpitestsFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6mstflintFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6openmpiFixedRHSA-2013:166120.11.2013
Red Hat Enterprise Linux 6perftestFixedRHSA-2013:166120.11.2013

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=865483librdmacm: Tried to connect to port 6125 if ibacm.port was not found

EPSS

Процентиль: 60%
0.00399
Низкий

1.2 Low

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

nvd
почти 13 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

debian
почти 13 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6 ...

github
больше 3 лет назад

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

oracle-oval
больше 11 лет назад

ELSA-2013-1661: rdma stack security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 60%
0.00399
Низкий

1.2 Low

CVSS2