Vulnerability Details : CVE-2011-0006
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
Threat overview for CVE-2011-0006
Top countries where our scanners detected CVE-2011-0006
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2011-0006 4,553
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-0006!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-0006
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-0006
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2011-0006
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0006
-
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
404 Not Found
-
https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9
ima: fix add LSM rule bug · torvalds/linux@867c202 · GitHubPatch
-
http://www.openwall.com/lists/oss-security/2011/01/06/18
oss-security - Re: CVE Request: kernel [Re: Security review of 2.6.32.28]
-
https://bugzilla.redhat.com/show_bug.cgi?id=667912
667912 – (CVE-2011-0006) CVE-2011-0006 kernel: ima: fix add LSM rule bug
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=867c20265459d30a01b021a9c1e81fb4c5832aa9
Products affected by CVE-2011-0006
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*