Vulnerability Details : CVE-2011-4914
Potential exploit
The ROSE protocol implementation in the Linux kernel before 2.6.39 does not verify that certain data-length values are consistent with the amount of data sent, which might allow remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) via crafted data to a ROSE socket.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2011-4914
- cpe:2.3:o:novell:suse_linux_enterprise_server:10.0:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38.7:*:*:*:*:*:*:*
Threat overview for CVE-2011-4914
Top countries where our scanners detected CVE-2011-4914
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2011-4914 3,760
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-4914!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-4914
1.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4914
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2011-4914
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4914
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0bccd315db0c2f919e7fcf9cb60db21d9986f52
-
http://www.openwall.com/lists/oss-security/2011/12/28/2
oss-security - Re: CVE request: kernel: multiple issues in ROSE
-
https://bugzilla.redhat.com/show_bug.cgi?id=770777
770777 – (CVE-2011-1493, CVE-2011-4913, CVE-2011-4914) CVE-2011-1493 CVE-2011-4913 CVE-2011-4914 kernel: multiple issues in rose protocolIssue Tracking;VDB Entry
-
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
404 Not FoundBroken Link
-
https://github.com/torvalds/linux/commit/e0bccd315db0c2f919e7fcf9cb60db21d9986f52
rose: Add length checks to CALL_REQUEST parsing · torvalds/linux@e0bccd3 · GitHubExploit;Patch
-
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
[security-announce] SUSE-SU-2015:0812-1: important: Security update forThird Party Advisory
Jump to