Executive Summary

Informations
Name CVE-2013-0310 First vendor Publication 2013-02-21
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:S/C:C/I:C/A:C)
Cvss Base Score 6.6 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 2.7 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0310

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17388
 
Oval ID: oval:org.mitre.oval:def:17388
Title: USN-1580-1 -- Linux kernel (OMAP4) vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): usn-1580-1
CVE-2012-3412
CVE-2012-3430
CVE-2012-6547
CVE-2013-0310
Version: 7
Platform(s): Ubuntu 12.04
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17557
 
Oval ID: oval:org.mitre.oval:def:17557
Title: USN-1554-1 -- linux vulnerability
Description: The system could be made to crash under certain conditions.
Family: unix Class: patch
Reference(s): USN-1554-1
CVE-2012-2372
CVE-2012-6547
CVE-2013-0310
Version: 7
Platform(s): Ubuntu 11.10
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17699
 
Oval ID: oval:org.mitre.oval:def:17699
Title: USN-1558-1 -- linux-ti-omap4 vulnerability
Description: The system could be made to crash under certain conditions.
Family: unix Class: patch
Reference(s): USN-1558-1
CVE-2012-2372
CVE-2012-6547
CVE-2013-0310
Version: 7
Platform(s): Ubuntu 11.10
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18026
 
Oval ID: oval:org.mitre.oval:def:18026
Title: USN-1579-1 -- linux vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1579-1
CVE-2012-3412
CVE-2012-3430
CVE-2012-6547
CVE-2013-0310
Version: 7
Platform(s): Ubuntu 12.04
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18035
 
Oval ID: oval:org.mitre.oval:def:18035
Title: USN-1563-1 -- linux-lts-backport-oneiric vulnerability
Description: The system could be made to crash under certain conditions.
Family: unix Class: patch
Reference(s): USN-1563-1
CVE-2012-2372
CVE-2012-6547
CVE-2013-0310
Version: 7
Platform(s): Ubuntu 10.04
Product(s): linux-lts-backport-oneiric
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27654
 
Oval ID: oval:org.mitre.oval:def:27654
Title: ELSA-2013-2507 -- Unbreakable Enterprise kernel security and bug fix update (important)
Description: [2.6.39-400.17.1] - This is a fix on dlm_clean_master_list() (Xiaowei.Hu) - RDS: fix rds-ping spinlock recursion (jeff.liu) [Orabug: 16223050] - vhost: fix length for cross region descriptor (Michael S. Tsirkin) [Orabug: 16387183] {CVE-2013-0311} - kabifix: block/scsi: Allow request and error handling timeouts to be specified (Maxim Uvarov) - block/scsi: Allow request and error handling timeouts to be specified (Martin K. Petersen) [Orabug: 16372401] - [SCSI] Shorten the path length of scsi_cmd_to_driver() (Li Zhong) [Orabug: 16372401] - Fix NULL dereferences in scsi_cmd_to_driver (Mark Rustad) [Orabug: 16372401] - SCSI: Fix error handling when no ULD is attached (Martin K. Petersen) [Orabug: 16372401] - Handle disk devices which can not process medium access commands (Martin K. Petersen) [Orabug: 16372401] - the ac->ac_allow_chain_relink=0 won't disable group relink (Xiaowei.Hu) [Orabug: 14842737] - pci: hotplug: fix null dereference in pci_set_payload() (Jerry Snitselaar) [Orabug: 16345420]
Family: unix Class: patch
Reference(s): ELSA-2013-2507
CVE-2013-0228
CVE-2013-0309
CVE-2013-0311
CVE-2013-0310
Version: 3
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): kernel-uek
kernel-uek-debug
kernel-uek-debug-devel
kernel-uek-devel
kernel-uek-doc
kernel-uek-firmware
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1669
Os 1

Nessus® Vulnerability Scanner

Date Description
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2013-0579.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0496.nasl - Type : ACT_GATHER_INFO
2013-03-10 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0496.nasl - Type : ACT_GATHER_INFO
2013-03-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0496.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.8
https://bugzilla.redhat.com/show_bug.cgi?id=912900
https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a...
MISC http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3...
MLIST http://www.openwall.com/lists/oss-security/2013/02/20/5
REDHAT http://rhn.redhat.com/errata/RHSA-2013-0496.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Date Informations
2024-02-02 01:21:40
  • Multiple Updates
2024-02-01 12:06:21
  • Multiple Updates
2023-09-05 12:20:28
  • Multiple Updates
2023-09-05 01:06:15
  • Multiple Updates
2023-09-02 12:20:30
  • Multiple Updates
2023-09-02 01:06:21
  • Multiple Updates
2023-08-12 12:24:31
  • Multiple Updates
2023-08-12 01:06:22
  • Multiple Updates
2023-08-11 12:20:38
  • Multiple Updates
2023-08-11 01:06:33
  • Multiple Updates
2023-08-06 12:19:51
  • Multiple Updates
2023-08-06 01:06:23
  • Multiple Updates
2023-08-04 12:19:55
  • Multiple Updates
2023-08-04 01:06:26
  • Multiple Updates
2023-07-14 12:19:54
  • Multiple Updates
2023-07-14 01:06:20
  • Multiple Updates
2023-03-29 01:21:53
  • Multiple Updates
2023-03-28 12:06:27
  • Multiple Updates
2023-02-13 09:28:34
  • Multiple Updates
2023-02-02 21:28:40
  • Multiple Updates
2022-10-11 12:17:47
  • Multiple Updates
2022-10-11 01:06:03
  • Multiple Updates
2022-03-11 01:14:26
  • Multiple Updates
2021-05-25 12:11:08
  • Multiple Updates
2021-05-04 12:23:19
  • Multiple Updates
2021-04-22 01:27:52
  • Multiple Updates
2020-08-11 12:08:36
  • Multiple Updates
2020-08-08 01:08:35
  • Multiple Updates
2020-08-07 12:08:42
  • Multiple Updates
2020-08-07 01:09:08
  • Multiple Updates
2020-08-01 12:08:35
  • Multiple Updates
2020-07-30 01:09:00
  • Multiple Updates
2020-05-24 01:10:10
  • Multiple Updates
2020-05-23 00:35:43
  • Multiple Updates
2019-04-22 21:19:07
  • Multiple Updates
2019-01-25 12:05:10
  • Multiple Updates
2018-11-17 12:03:41
  • Multiple Updates
2018-10-30 12:05:34
  • Multiple Updates
2018-08-09 12:01:48
  • Multiple Updates
2016-06-30 21:35:23
  • Multiple Updates
2016-06-28 22:15:29
  • Multiple Updates
2016-06-28 19:15:57
  • Multiple Updates
2015-05-21 13:29:58
  • Multiple Updates
2014-11-08 13:30:29
  • Multiple Updates
2014-02-17 11:15:34
  • Multiple Updates
2013-05-10 22:28:05
  • Multiple Updates
2013-03-08 13:19:27
  • Multiple Updates
2013-02-22 17:20:31
  • Multiple Updates
2013-02-22 13:22:24
  • First insertion