Vulnerability Description
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.38.8 |
Related Weaknesses (CWE)
References
- http://downloads.avaya.com/css/P8/documents/100145416
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://marc.info/?l=netfilter-devel&m=129978081009955&w=2Patch
- http://rhn.redhat.com/errata/RHSA-2011-0833.html
- http://securityreason.com/securityalert/8278
- http://securityreason.com/securityalert/8282
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- http://www.openwall.com/lists/oss-security/2011/03/18/15Patch
- http://www.openwall.com/lists/oss-security/2011/03/21/1Patch
- http://www.openwall.com/lists/oss-security/2011/03/21/4Patch
- https://bugzilla.redhat.com/show_bug.cgi?id=689321Patch
- http://downloads.avaya.com/css/P8/documents/100145416
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://marc.info/?l=netfilter-devel&m=129978081009955&w=2Patch
- http://rhn.redhat.com/errata/RHSA-2011-0833.html
FAQ
What is CVE-2011-1170?
CVE-2011-1170 is a vulnerability with a CVSS score of 2.1 (LOW). net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure mem...
How severe is CVE-2011-1170?
CVE-2011-1170 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1170?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.