CVE-2012-3520

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html
http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html
http://secunia.com/advisories/50848
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30
http://www.openwall.com/lists/oss-security/2012/08/22/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/55152
http://www.ubuntu.com/usn/USN-1599-1
http://www.ubuntu.com/usn/USN-1610-1
https://bugzilla.redhat.com/show_bug.cgi?id=850449
https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea Exploit
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html
http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html
http://secunia.com/advisories/50848
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30
http://www.openwall.com/lists/oss-security/2012/08/22/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/55152
http://www.ubuntu.com/usn/USN-1599-1
http://www.ubuntu.com/usn/USN-1610-1
https://bugzilla.redhat.com/show_bug.cgi?id=850449
https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:41

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea -
References () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html -
References () http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html - () http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html -
References () http://secunia.com/advisories/50848 - () http://secunia.com/advisories/50848 -
References () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30 - () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30 -
References () http://www.openwall.com/lists/oss-security/2012/08/22/1 - () http://www.openwall.com/lists/oss-security/2012/08/22/1 -
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -
References () http://www.securityfocus.com/bid/55152 - () http://www.securityfocus.com/bid/55152 -
References () http://www.ubuntu.com/usn/USN-1599-1 - () http://www.ubuntu.com/usn/USN-1599-1 -
References () http://www.ubuntu.com/usn/USN-1610-1 - () http://www.ubuntu.com/usn/USN-1610-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=850449 - () https://bugzilla.redhat.com/show_bug.cgi?id=850449 -
References () https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea - Exploit () https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea - Exploit

Information

Published : 2012-10-03 11:02

Updated : 2024-11-21 01:41


NVD link : CVE-2012-3520

Mitre link : CVE-2012-3520

CVE.ORG link : CVE-2012-3520


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-287

Improper Authentication