Executive Summary

Informations
Name CVE-2011-0714 First vendor Publication 2011-05-04
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:M/Au:N/C:N/I:N/A:C)
Cvss Base Score 5.7 Attack Range Adjacent network
Cvss Impact Score 6.9 Attack Complexity Medium
Cvss Expoit Score 5.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0714

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21559
 
Oval ID: oval:org.mitre.oval:def:21559
Title: RHSA-2011:0329: kernel security update (Important)
Description: Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function.
Family: unix Class: patch
Reference(s): RHSA-2011:0329-01
CVE-2011-0714
Version: 4
Platform(s): Red Hat Enterprise Linux 6
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23651
 
Oval ID: oval:org.mitre.oval:def:23651
Title: ELSA-2011:0329: kernel security update (Important)
Description: Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function.
Family: unix Class: patch
Reference(s): ELSA-2011:0329-01
CVE-2011-0714
Version: 6
Platform(s): Oracle Linux 6
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28082
 
Oval ID: oval:org.mitre.oval:def:28082
Title: DEPRECATED: ELSA-2011-0329 -- kernel security update (important)
Description: [2.6.32-71.18.2.el6] - [fs] sunrpc: Correct a misapplied patch (J. Bruce Fields) [678094 678146]
Family: unix Class: patch
Reference(s): ELSA-2011-0329
CVE-2011-0714
Version: 4
Platform(s): Oracle Linux 6
Product(s): kernel
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1

OpenVAS Exploits

Date Description
2012-06-06 Name : RedHat Update for kernel RHSA-2011:0329-01
File : nvt/gb_RHSA-2011_0329-01_kernel.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71654 Linux Kernel RPC Server Sockets Implementation Malformed Packet Handling Use-...

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0329.nasl - Type : ACT_GATHER_INFO
2011-03-09 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0329.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://openwall.com/lists/oss-security/2011/03/08/17
http://openwall.com/lists/oss-security/2011/03/09/1
https://bugzilla.redhat.com/show_bug.cgi?id=678144
https://rhn.redhat.com/errata/RHSA-2011-0329.html
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Date Informations
2024-11-28 23:05:19
  • Multiple Updates
2024-11-28 12:24:49
  • Multiple Updates
2024-08-02 12:15:53
  • Multiple Updates
2024-08-02 01:04:23
  • Multiple Updates
2024-02-02 01:15:25
  • Multiple Updates
2024-02-01 12:04:17
  • Multiple Updates
2023-09-05 12:14:25
  • Multiple Updates
2023-09-05 01:04:09
  • Multiple Updates
2023-09-02 12:14:28
  • Multiple Updates
2023-09-02 01:04:13
  • Multiple Updates
2023-08-12 12:17:24
  • Multiple Updates
2023-08-12 01:04:13
  • Multiple Updates
2023-08-11 12:14:33
  • Multiple Updates
2023-08-11 01:04:21
  • Multiple Updates
2023-08-06 12:13:59
  • Multiple Updates
2023-08-06 01:04:14
  • Multiple Updates
2023-08-04 12:14:04
  • Multiple Updates
2023-08-04 01:04:15
  • Multiple Updates
2023-07-14 12:14:02
  • Multiple Updates
2023-07-14 01:04:13
  • Multiple Updates
2023-03-29 01:15:58
  • Multiple Updates
2023-03-28 12:04:19
  • Multiple Updates
2022-10-11 12:12:30
  • Multiple Updates
2022-10-11 01:03:59
  • Multiple Updates
2020-08-07 12:06:08
  • Multiple Updates
2020-05-23 00:27:48
  • Multiple Updates
2019-04-22 21:19:05
  • Multiple Updates
2014-02-17 11:00:29
  • Multiple Updates
2013-05-10 22:54:38
  • Multiple Updates