CVE-2012-3520

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea

http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html

http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html

http://secunia.com/advisories/50848

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30

http://www.openwall.com/lists/oss-security/2012/08/22/1

http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

http://www.securityfocus.com/bid/55152

http://www.ubuntu.com/usn/USN-1599-1

http://www.ubuntu.com/usn/USN-1610-1

https://bugzilla.redhat.com/show_bug.cgi?id=850449

https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea

Details

Source: MITRE

Published: 2012-10-03

Updated: 2016-10-12

Type: CWE-287

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.2.29 (inclusive)

cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
90019OracleVM 3.2 : kernel-uek (OVMSA-2016-0037)NessusOracleVM Local Security Checks
critical
76653RHEL 6 : MRG (RHSA-2012:1491)NessusRed Hat Local Security Checks
high
74778openSUSE Security Update : kernel (openSUSE-SU-2012:1330-1)NessusSuSE Local Security Checks
high
69612Amazon Linux AMI : kernel (ALAS-2012-122)NessusAmazon Linux Local Security Checks
low
62547Ubuntu 12.04 LTS : linux vulnerability (USN-1610-1)NessusUbuntu Local Security Checks
low
62475USN-1599-1 : linux-ti-omap4 vulnerabilityNessusUbuntu Local Security Checks
low
61739Fedora 16 : kernel-3.4.9-2.fc16 (2012-12684)NessusFedora Local Security Checks
low