Lucene search

K
cve[email protected]CVE-2011-4080
HistoryMay 24, 2012 - 11:55 p.m.

CVE-2011-4080

2012-05-2423:55:02
CWE-264
web.nvd.nist.gov
37
cve-2011-4080
linux kernel
sysrq_sysctl_handler
dmesg_restrict
access restrictions
root privileges
security vulnerability

4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:C/I:N/A:N

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.

Affected configurations

NVD
Node
linuxlinux_kernelRange<2.6.39

4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:C/I:N/A:N

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%