Vulnerability Details : CVE-2013-7267
The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
Vulnerability category: Input validation
Threat overview for CVE-2013-7267
Top countries where our scanners detected CVE-2013-7267
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2013-7267 160,821
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-7267!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-7267
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less