CVE-2008-4113 : Dettaglio

CVE-2008-4113

A01-Broken Access Control
0.19%V4
Local
2008-09-16
23h00 +00:00
2024-08-07
10h00 +00:00
Notifiche per una CVE specifica
Rimani informato su qualsiasi modifica relativa a una CVE specifica.
Gestione notifiche

Descrizioni CVE

The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.

Informazioni CVE

Vulnerabilità correlate

CWE-ID Nome della vulnerabilità Source
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Metriche

Metriche Punteggio Gravità CVSS Vettore Source
V2 4.7 AV:L/AC:M/Au:N/C:C/I:N/A:N nvd@nist.gov

EPSS

EPSS è un modello di punteggio che prevede la probabilità che una vulnerabilità venga sfruttata.

Punteggio EPSS

Il modello EPSS produce un punteggio di probabilità compreso tra 0 e 1 (da 0 a 100%). Più alto è il punteggio, maggiore è la probabilità che una vulnerabilità venga sfruttata.

Percentile EPSS

Il percentile viene utilizzato per classificare le CVE in base al loro punteggio EPSS. Ad esempio, una CVE al 95° percentile secondo il suo punteggio EPSS ha una probabilità maggiore di essere sfruttata rispetto al 95% delle altre CVE. Il percentile consente quindi di confrontare il punteggio EPSS di una CVE con quello delle altre.

Informazioni sull'exploit

Exploit Database EDB-ID : 7618

Data di pubblicazione : 2008-12-28 23h00 +00:00
Autore : Jon Oberheide
Verificato EDB : Yes

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 2.6.25.14

Linux>>Linux_kernel >> Version 2.2.27

Linux>>Linux_kernel >> Version 2.4.36

Linux>>Linux_kernel >> Version 2.4.36.1

Linux>>Linux_kernel >> Version 2.4.36.2

Linux>>Linux_kernel >> Version 2.4.36.3

Linux>>Linux_kernel >> Version 2.4.36.4

Linux>>Linux_kernel >> Version 2.4.36.5

Linux>>Linux_kernel >> Version 2.4.36.6

Linux>>Linux_kernel >> Version 2.6

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.19.4

Linux>>Linux_kernel >> Version 2.6.19.5

Linux>>Linux_kernel >> Version 2.6.19.6

Linux>>Linux_kernel >> Version 2.6.19.7

Linux>>Linux_kernel >> Version 2.6.20.16

Linux>>Linux_kernel >> Version 2.6.20.17

Linux>>Linux_kernel >> Version 2.6.20.18

Linux>>Linux_kernel >> Version 2.6.20.19

Linux>>Linux_kernel >> Version 2.6.20.20

Linux>>Linux_kernel >> Version 2.6.20.21

Linux>>Linux_kernel >> Version 2.6.21.5

Linux>>Linux_kernel >> Version 2.6.21.6

Linux>>Linux_kernel >> Version 2.6.21.7

Linux>>Linux_kernel >> Version 2.6.22

Linux>>Linux_kernel >> Version 2.6.22.2

Linux>>Linux_kernel >> Version 2.6.22.8

Linux>>Linux_kernel >> Version 2.6.22.9

Linux>>Linux_kernel >> Version 2.6.22.10

Linux>>Linux_kernel >> Version 2.6.22.11

Linux>>Linux_kernel >> Version 2.6.22.12

Linux>>Linux_kernel >> Version 2.6.22.13

Linux>>Linux_kernel >> Version 2.6.22.14

Linux>>Linux_kernel >> Version 2.6.22.15

Linux>>Linux_kernel >> Version 2.6.22.17

Linux>>Linux_kernel >> Version 2.6.22.18

Linux>>Linux_kernel >> Version 2.6.22.19

Linux>>Linux_kernel >> Version 2.6.22.20

Linux>>Linux_kernel >> Version 2.6.22.21

Linux>>Linux_kernel >> Version 2.6.22.22

Linux>>Linux_kernel >> Version 2.6.22_rc1

Linux>>Linux_kernel >> Version 2.6.22_rc7

Linux>>Linux_kernel >> Version 2.6.23

Linux>>Linux_kernel >> Version 2.6.23.8

Linux>>Linux_kernel >> Version 2.6.23.9

Linux>>Linux_kernel >> Version 2.6.23.10

Linux>>Linux_kernel >> Version 2.6.23.11

Linux>>Linux_kernel >> Version 2.6.23.12

Linux>>Linux_kernel >> Version 2.6.23.13

Linux>>Linux_kernel >> Version 2.6.23.15

Linux>>Linux_kernel >> Version 2.6.23.16

Linux>>Linux_kernel >> Version 2.6.23.17

Linux>>Linux_kernel >> Version 2.6.23_rc1

Linux>>Linux_kernel >> Version 2.6.24

Linux>>Linux_kernel >> Version 2.6.24.1

Linux>>Linux_kernel >> Version 2.6.24.2

Linux>>Linux_kernel >> Version 2.6.24.3

Linux>>Linux_kernel >> Version 2.6.24.4

Linux>>Linux_kernel >> Version 2.6.24.5

Linux>>Linux_kernel >> Version 2.6.24.6

Linux>>Linux_kernel >> Version 2.6.24.7

Linux>>Linux_kernel >> Version 2.6.24_rc1

Linux>>Linux_kernel >> Version 2.6.24_rc4

Linux>>Linux_kernel >> Version 2.6.24_rc5

Linux>>Linux_kernel >> Version 2.6.25

Linux>>Linux_kernel >> Version 2.6.25

Linux>>Linux_kernel >> Version 2.6.25.1

Linux>>Linux_kernel >> Version 2.6.25.1

Linux>>Linux_kernel >> Version 2.6.25.2

Linux>>Linux_kernel >> Version 2.6.25.2

Linux>>Linux_kernel >> Version 2.6.25.3

Linux>>Linux_kernel >> Version 2.6.25.3

Linux>>Linux_kernel >> Version 2.6.25.4

Linux>>Linux_kernel >> Version 2.6.25.4

Linux>>Linux_kernel >> Version 2.6.25.5

Linux>>Linux_kernel >> Version 2.6.25.5

Linux>>Linux_kernel >> Version 2.6.25.6

Linux>>Linux_kernel >> Version 2.6.25.6

Linux>>Linux_kernel >> Version 2.6.25.7

Linux>>Linux_kernel >> Version 2.6.25.7

Linux>>Linux_kernel >> Version 2.6.25.8

Linux>>Linux_kernel >> Version 2.6.25.8

Linux>>Linux_kernel >> Version 2.6.25.9

Linux>>Linux_kernel >> Version 2.6.25.9

Linux>>Linux_kernel >> Version 2.6.25.10

Linux>>Linux_kernel >> Version 2.6.25.10

Linux>>Linux_kernel >> Version 2.6.25.11

Linux>>Linux_kernel >> Version 2.6.25.11

Linux>>Linux_kernel >> Version 2.6.25.12

Linux>>Linux_kernel >> Version 2.6.25.12

Linux>>Linux_kernel >> Version 2.6.25.13

Linux>>Linux_kernel >> Version 2.6.25.15

Riferimenti

http://www.securitytracker.com/id?1021000
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/32190
Tags : third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/4266
Tags : third-party-advisory, x_refsource_SREASON
http://www.debian.org/security/2008/dsa-1655
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/32393
Tags : third-party-advisory, x_refsource_SECUNIA
https://www.exploit-db.com/exploits/7618
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/31121
Tags : vdb-entry, x_refsource_BID
http://www.ubuntu.com/usn/usn-659-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2008-0857.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/32315
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2008/09/26/6
Tags : mailing-list, x_refsource_MLIST