Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-4914 | First vendor Publication | 2012-06-21 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The ROSE protocol implementation in the Linux kernel before 2.6.39 does not verify that certain data-length values are consistent with the amount of data sent, which might allow remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) via crafted data to a ROSE socket. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4914 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14979 | |||
Oval ID: | oval:org.mitre.oval:def:14979 | ||
Title: | USN-1208-1 -- Linux kernel (Marvel DOVE) vulnerabilities | ||
Description: | linux-mvl-dove: Linux kernel for DOVE Multiple kernel flaws have been fixed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1208-1 CVE-2010-4076 CVE-2010-4077 CVE-2010-4251 CVE-2010-4805 CVE-2011-1020 CVE-2011-1493 CVE-2011-1577 CVE-2011-1585 CVE-2011-1767 CVE-2011-1768 CVE-2011-2182 CVE-2011-2183 CVE-2011-2213 CVE-2011-2484 CVE-2011-2492 CVE-2011-2700 CVE-2011-2723 CVE-2011-2909 CVE-2011-2918 CVE-2011-3637 CVE-2011-4914 | Version: | 5 |
Platform(s): | Ubuntu 10.10 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15108 | |||
Oval ID: | oval:org.mitre.oval:def:15108 | ||
Title: | USN-1203-1 -- Linux kernel (Marvel DOVE) vulnerabilities | ||
Description: | linux-mvl-dove: Linux kernel for DOVE Multiple kernel flaws have been fixed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1203-1 CVE-2010-4076 CVE-2010-4077 CVE-2010-4251 CVE-2010-4805 CVE-2011-1020 CVE-2011-1493 CVE-2011-1577 CVE-2011-1585 CVE-2011-1767 CVE-2011-1768 CVE-2011-2182 CVE-2011-2183 CVE-2011-2213 CVE-2011-2484 CVE-2011-2492 CVE-2011-2700 CVE-2011-2723 CVE-2011-2909 CVE-2011-2918 CVE-2011-3637 CVE-2011-4914 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15142 | |||
Oval ID: | oval:org.mitre.oval:def:15142 | ||
Title: | USN-1204-1 -- Linux kernel (i.MX51) vulnerabilities | ||
Description: | linux-fsl-imx51: Linux kernel for IMX51 Multiple kernel flaws have been fixed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1204-1 CVE-2010-3859 CVE-2010-4075 CVE-2010-4076 CVE-2010-4077 CVE-2010-4158 CVE-2010-4160 CVE-2010-4162 CVE-2010-4163 CVE-2010-4668 CVE-2010-4175 CVE-2010-4242 CVE-2010-4243 CVE-2010-4251 CVE-2010-4805 CVE-2010-4526 CVE-2010-4649 CVE-2011-1044 CVE-2011-0726 CVE-2011-1010 CVE-2011-1012 CVE-2011-1013 CVE-2011-1020 CVE-2011-1078 CVE-2011-1079 CVE-2011-1080 CVE-2011-1082 CVE-2011-1090 CVE-2011-1093 CVE-2011-1160 CVE-2011-1163 CVE-2011-1170 CVE-2011-1171 CVE-2011-1172 CVE-2011-2534 CVE-2011-1173 CVE-2011-1180 CVE-2011-1478 CVE-2011-1493 CVE-2011-1577 CVE-2011-1598 CVE-2011-1770 CVE-2011-1833 CVE-2011-2484 CVE-2011-2492 CVE-2011-2699 CVE-2011-2918 CVE-2011-3637 CVE-2011-4913 CVE-2011-4914 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15414 | |||
Oval ID: | oval:org.mitre.oval:def:15414 | ||
Title: | DSA-2389-1 linux-2.6 -- privilege escalation/denial of service/information leak | ||
Description: | Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-2183 Andrea Righi reported an issue in KSM, a memory-saving de-duplication feature. By exploiting a race with exiting tasks, local users can cause a kernel oops, resulting in a denial of service. CVE-2011-2213 Dan Rosenberg discovered an issue in the INET socket monitoring interface. Local users could cause a denial of service by injecting code and causing the kernel to execute an infinite loop. CVE-2011-2898 Eric Dumazet reported an information leak in the raw packet socket implementation. CVE-2011-3353 Han-Wen Nienhuys reported a local denial of service issue issue in the FUSE support in the linux kernel. Local users could cause a buffer overflow, leading to a kernel oops and resulting in a denial of service. CVE-2011-4077 Carlos Maiolino reported an issue in the XFS filesystem. A local user with the ability to mount a filesystem could corrupt memory resulting in a denial of service or possibly gain elevated privileges. CVE-2011-4110 David Howells reported an issue in the kernel's access key retention system which allow local users to cause a kernel oops leading to a denial of service. CVE-2011-4127 Paolo Bonzini of Red Hat reported an issue in the ioctl passthrough support for SCSI devices. Users with permission to access restricted portions of a device can obtain access to the entire device by way of the SG_IO ioctl. This could be exploited by a local user or privileged VM guest to achieve a privilege escalation. CVE-2011-4611 Maynard Johnson reported an issue with the perf support on POWER7 systems that allows local users to cause a denial of service. CVE-2011-4622 Jan Kiszka reported an issue in the KVM PIT timer support. Local users with the permission to use KVM can cause a denial of service by starting a PIT timer without first setting up the irqchip. CVE-2011-4914 Ben Hutchings reported various bounds checking issues within the ROSE protocol support in the kernel. Remote users could possibly use this to gain access to sensitive memory or cause a denial of service. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2389-1 CVE-2011-2183 CVE-2011-2213 CVE-2011-2898 CVE-2011-3353 CVE-2011-4077 CVE-2011-4110 CVE-2011-4127 CVE-2011-4611 CVE-2011-4622 CVE-2011-4914 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | linux-2.6 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20869 | |||
Oval ID: | oval:org.mitre.oval:def:20869 | ||
Title: | USN-1216-1 -- linux-ec2 vulnerabilities | ||
Description: | Multiple kernel flaws have been fixed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1216-1 CVE-2010-4076 CVE-2010-4077 CVE-2010-4251 CVE-2010-4805 CVE-2011-1020 CVE-2011-1493 CVE-2011-1577 CVE-2011-1585 CVE-2011-1767 CVE-2011-1768 CVE-2011-2182 CVE-2011-2183 CVE-2011-2213 CVE-2011-2484 CVE-2011-2492 CVE-2011-2700 CVE-2011-2723 CVE-2011-2909 CVE-2011-2918 CVE-2011-3637 CVE-2011-4914 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20889 | |||
Oval ID: | oval:org.mitre.oval:def:20889 | ||
Title: | USN-1212-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Multiple kernel flaws have been fixed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1212-1 CVE-2011-0463 CVE-2011-1017 CVE-2011-1020 CVE-2011-1078 CVE-2011-1079 CVE-2011-1080 CVE-2011-1160 CVE-2011-1170 CVE-2011-1171 CVE-2011-1172 CVE-2011-2534 CVE-2011-1173 CVE-2011-1180 CVE-2011-1182 CVE-2011-1476 CVE-2011-1477 CVE-2010-4250 CVE-2011-1479 CVE-2011-1493 CVE-2011-1494 CVE-2011-1495 CVE-2011-1577 CVE-2011-1581 CVE-2011-1593 CVE-2011-1598 CVE-2011-1748 CVE-2011-1745 CVE-2011-2022 CVE-2011-1746 CVE-2011-1770 CVE-2011-1771 CVE-2011-1833 CVE-2011-2484 CVE-2011-2492 CVE-2011-2493 CVE-2011-2689 CVE-2011-2699 CVE-2011-2918 CVE-2011-3359 CVE-2011-3637 CVE-2011-4621 CVE-2011-4913 CVE-2011-4914 | Version: | 5 |
Platform(s): | Ubuntu 11.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2389-1 (linux-2.6 - privilege escalation/denial ... File : nvt/deb_2389_1.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2012-01-18 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2389.nasl - Type : ACT_GATHER_INFO |
2011-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1256-1.nasl - Type : ACT_GATHER_INFO |
2011-09-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1218-1.nasl - Type : ACT_GATHER_INFO |
2011-09-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1216-1.nasl - Type : ACT_GATHER_INFO |
2011-09-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1211-1.nasl - Type : ACT_GATHER_INFO |
2011-09-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1208-1.nasl - Type : ACT_GATHER_INFO |
2011-09-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1201-1.nasl - Type : ACT_GATHER_INFO |
2011-09-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1203-1.nasl - Type : ACT_GATHER_INFO |
2011-08-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1189-1.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:01:24 |
|
2024-11-28 12:28:06 |
|
2024-08-02 12:18:23 |
|
2024-08-02 01:05:23 |
|
2024-02-02 01:17:52 |
|
2024-02-01 12:05:15 |
|
2023-09-05 12:16:46 |
|
2023-09-05 01:05:08 |
|
2023-09-02 12:16:51 |
|
2023-09-02 01:05:13 |
|
2023-08-12 12:20:29 |
|
2023-08-12 01:05:14 |
|
2023-08-11 12:16:57 |
|
2023-08-11 01:05:24 |
|
2023-08-06 12:16:18 |
|
2023-08-06 01:05:15 |
|
2023-08-04 12:16:22 |
|
2023-08-04 01:05:15 |
|
2023-07-14 12:16:21 |
|
2023-07-14 01:05:12 |
|
2023-03-29 01:18:18 |
|
2023-03-28 12:05:20 |
|
2023-02-13 05:28:31 |
|
2022-10-11 12:14:36 |
|
2022-10-11 01:04:57 |
|
2022-03-11 01:11:59 |
|
2021-05-25 12:09:13 |
|
2021-05-04 12:18:02 |
|
2021-04-22 01:21:20 |
|
2020-08-11 12:07:05 |
|
2020-08-08 01:07:07 |
|
2020-08-07 12:07:13 |
|
2020-08-07 01:07:23 |
|
2020-08-01 12:07:08 |
|
2020-07-30 01:07:29 |
|
2020-05-23 01:47:42 |
|
2020-05-23 00:32:23 |
|
2019-01-25 12:04:27 |
|
2018-11-17 12:02:59 |
|
2018-10-30 12:04:47 |
|
2016-08-18 21:27:42 |
|
2016-07-01 11:08:02 |
|
2016-06-29 00:24:54 |
|
2016-06-28 18:55:52 |
|
2016-04-26 21:18:51 |
|
2015-05-21 13:29:24 |
|
2015-05-12 09:27:05 |
|
2014-02-17 11:06:35 |
|
2013-09-20 17:21:10 |
|
2013-07-26 17:19:54 |
|
2013-05-10 23:12:12 |
|