National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2013-3235 Detail

Description

net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

Source:  MITRE      Last Modified:  04/22/2013

Quick Info

CVE Dictionary Entry:
CVE-2013-3235
Original release date:
04/22/2013
Last revised:
11/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.9 MEDIUM
Vector:
(AV:L/AC:L/Au:N/C:C/I:N/A:N) (legend)
Impact Subscore:
6.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=60085c3d009b0df252547adb336d1ccca5ce52ec Vendor Advisory External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=60085c3d009b0df252547adb336d1ccca5ce52ec
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html External Source SUSE SUSE-SU-2013:1182
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html External Source SUSE openSUSE-SU-2013:1187
http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html External Source SUSE openSUSE-SU-2013:1971
http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 External Source MANDRIVA MDVSA-2013:176
http://www.openwall.com/lists/oss-security/2013/04/14/3 External Source MLIST [oss-security] 20130414 Linux kernel: more net info leak fixes for v3.9
http://www.ubuntu.com/usn/USN-1837-1 External Source UBUNTU USN-1837-1
https://github.com/torvalds/linux/commit/60085c3d009b0df252547adb336d1ccca5ce52ec Vendor Advisory External Source CONFIRM https://github.com/torvalds/linux/commit/60085c3d009b0df252547adb336d1ccca5ce52ec
https://lkml.org/lkml/2013/4/14/107 Vendor Advisory External Source MLIST [linux-kernel] 20130414 Linux 3.9-rc7

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Change History 2 change records found - show changes