9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.027 Low
EPSS
Percentile
90.3%
It was discovered that the /proc filesystem did not correctly handle
permission changes when programs executed. A local attacker could hold open
files to examine details about programs running with higher privileges,
potentially increasing the chances of exploiting additional
vulnerabilities. (CVE-2011-1020)
Vasiliy Kulikov discovered that the Bluetooth stack did not correctly clear
memory. A local attacker could exploit this to read kernel stack memory,
leading to a loss of privacy. (CVE-2011-1078)
Vasiliy Kulikov discovered that the Bluetooth stack did not correctly check
that device name strings were NULL terminated. A local attacker could
exploit this to crash the system, leading to a denial of service, or leak
contents of kernel stack memory, leading to a loss of privacy.
(CVE-2011-1079)
Vasiliy Kulikov discovered that bridge network filtering did not check that
name fields were NULL terminated. A local attacker could exploit this to
leak contents of kernel stack memory, leading to a loss of privacy.
(CVE-2011-1080)
Johan Hovold discovered that the DCCP network stack did not correctly
handle certain packet combinations. A remote attacker could send specially
crafted network traffic that would crash the system, leading to a denial of
service. (CVE-2011-1093)
Peter Huewe discovered that the TPM device did not correctly initialize
memory. A local attacker could exploit this to read kernel heap memory
contents, leading to a loss of privacy. (CVE-2011-1160)
Dan Rosenberg discovered that the IRDA subsystem did not correctly check
certain field sizes. If a system was using IRDA, a remote attacker could
send specially crafted traffic to crash the system or gain root privileges.
(CVE-2011-1180)
Dan Rosenberg discovered that the X.25 Rose network stack did not correctly
handle certain fields. If a system was running with Rose enabled, a remote
attacker could send specially crafted traffic to gain root privileges.
(CVE-2011-1493)
It was discovered that Bluetooth l2cap and rfcomm did not correctly
initialize structures. A local attacker could exploit this to read portions
of the kernel stack, leading to a loss of privacy. (CVE-2011-2492)
Dan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by
amateur radio. A local user or a remote user on an X.25 network could
exploit these flaws to execute arbitrary code as root. (CVE-2011-4913)
Ben Hutchings discovered several flaws in the Linux Rose (X.25 PLP) layer.
A local user or a remote user on an X.25 network could exploit these flaws
to execute arbitrary code as root. (CVE-2011-4914)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 8.04 | noarch | linux-image-2.6.24-29-sparc64 | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | acpi-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | block-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | crypto-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | fat-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | fb-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | firewire-core-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | floppy-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | fs-core-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
Ubuntu | 8.04 | noarch | fs-secondary-modules-2.6.24-29-generic-di | < 2.6.24-29.93 | UNKNOWN |
ubuntu.com/security/CVE-2011-1020
ubuntu.com/security/CVE-2011-1078
ubuntu.com/security/CVE-2011-1079
ubuntu.com/security/CVE-2011-1080
ubuntu.com/security/CVE-2011-1093
ubuntu.com/security/CVE-2011-1160
ubuntu.com/security/CVE-2011-1180
ubuntu.com/security/CVE-2011-1493
ubuntu.com/security/CVE-2011-2492
ubuntu.com/security/CVE-2011-4913
ubuntu.com/security/CVE-2011-4914
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.027 Low
EPSS
Percentile
90.3%