CVE-2011-1171

LOW

Description

net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.

References

http://downloads.avaya.com/css/P8/documents/100145416

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=78b79876761b86653df89c48a7010b5cbd41a84a

http://marc.info/?l=linux-kernel&m=129978077609894&w=2

http://rhn.redhat.com/errata/RHSA-2011-0833.html

http://securityreason.com/securityalert/8278

http://securityreason.com/securityalert/8283

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39

http://www.openwall.com/lists/oss-security/2011/03/18/15

http://www.openwall.com/lists/oss-security/2011/03/21/1

http://www.openwall.com/lists/oss-security/2011/03/21/4

https://bugzilla.redhat.com/show_bug.cgi?id=689327

Details

Source: MITRE

Published: 2011-06-22

Updated: 2015-10-06

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 2.1

Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW