CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
5.1%
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected ‘\0’ character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.0 | cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.1 | cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.1 | cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:* |
linux | linux_kernel | 2.6.1 | cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:* |
linux | linux_kernel | 2.6.1 | cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:* |
linux | linux_kernel | 2.6.2 | cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.2 | cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:* |
linux | linux_kernel | 2.6.2 | cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:* |
linux | linux_kernel | 2.6.2 | cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:* |
downloads.avaya.com/css/P8/documents/100145416
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a
marc.info/?l=linux-kernel&m=129978077609894&w=2
rhn.redhat.com/errata/RHSA-2011-0833.html
securityreason.com/securityalert/8278
securityreason.com/securityalert/8283
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
www.openwall.com/lists/oss-security/2011/03/18/15
www.openwall.com/lists/oss-security/2011/03/21/1
www.openwall.com/lists/oss-security/2011/03/21/4
bugzilla.redhat.com/show_bug.cgi?id=689327