Vulnerability Details : CVE-2011-2492
The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
Vulnerability category: Information leak
Products affected by CVE-2011-2492
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.0:-:*:*:*:*:*:*
Threat overview for CVE-2011-2492
Top countries where our scanners detected CVE-2011-2492
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2011-2492 67
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-2492!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-2492
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2492
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2011-2492
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2492
-
http://www.openwall.com/lists/oss-security/2011/06/24/2
oss-security - CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspaceMailing List;Patch;Third Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc4
404: File not foundBroken Link
-
http://permalink.gmane.org/gmane.linux.bluez.kernel/12909
Broken Link
-
http://rhn.redhat.com/errata/RHSA-2011-0927.html
RHSA-2011:0927 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=703019
703019 – (CVE-2011-2492) CVE-2011-2492 kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspaceIssue Tracking;Patch;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d03e971cf403305217b8e62db3a2e5ad2d6263f
-
http://marc.info/?l=bugtraq&m=139447903326211&w=2
'[security bulletin] HPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control Server ' - MARCThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2011/06/24/3
oss-security - Re: CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspaceMailing List;Patch;Third Party Advisory
-
http://securitytracker.com/id?1025778
Linux Kernel Bluetooth 'l2cap_conninfo' and 'rfcomm_conninfo' Initialization Flaw Lets Local Users Obtain Kernel Memory Contents - SecurityTrackerThird Party Advisory;VDB Entry
Jump to