Vulnerability Details : CVE-2012-6689
The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
Vulnerability category: BypassGain privilege
Products affected by CVE-2012-6689
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6689
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-6689
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2012-6689
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-6689
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5
Release Notes;Vendor Advisory
-
https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef
netlink: fix possible spoofing from non-root processes · torvalds/linux@20e1db1 · GitHubThird Party Advisory
-
http://www.securityfocus.com/bid/72739
libmnl 'mnl_nlmsg_portid_ok()' Function Local Security Bypass VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://marc.info/?l=linux-netdev&m=134522422925986&w=2
'[PATCH 2/2] [RFC] netlink: fix possible spoofing from non-root processes' - MARCMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/02/22/10
oss-security - Re: libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messagesMailing List;Third Party Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=848949
848949 – (CVE-2012-6689) CVE-2012-6689 libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messagesIssue Tracking;Third Party Advisory
-
http://marc.info/?l=linux-netdev&m=134522422125983&w=2
'[PATCH 0/2] netlink patches' - MARCMailing List;Third Party Advisory
Jump to