2.1

CVE-2012-3430

Exploit

The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 3.0.43
LinuxLinux Kernel Version3.0.1
LinuxLinux Kernel Version3.0.2
LinuxLinux Kernel Version3.0.3
LinuxLinux Kernel Version3.0.4
LinuxLinux Kernel Version3.0.5
LinuxLinux Kernel Version3.0.6
LinuxLinux Kernel Version3.0.7
LinuxLinux Kernel Version3.0.8
LinuxLinux Kernel Version3.0.9
LinuxLinux Kernel Version3.0.10
LinuxLinux Kernel Version3.0.11
LinuxLinux Kernel Version3.0.12
LinuxLinux Kernel Version3.0.13
LinuxLinux Kernel Version3.0.14
LinuxLinux Kernel Version3.0.15
LinuxLinux Kernel Version3.0.16
LinuxLinux Kernel Version3.0.17
LinuxLinux Kernel Version3.0.18
LinuxLinux Kernel Version3.0.19
LinuxLinux Kernel Version3.0.20
LinuxLinux Kernel Version3.0.21
LinuxLinux Kernel Version3.0.22
LinuxLinux Kernel Version3.0.23
LinuxLinux Kernel Version3.0.24
LinuxLinux Kernel Version3.0.25
LinuxLinux Kernel Version3.0.26
LinuxLinux Kernel Version3.0.27
LinuxLinux Kernel Version3.0.28
LinuxLinux Kernel Version3.0.29
LinuxLinux Kernel Version3.0.30
LinuxLinux Kernel Version3.0.31
LinuxLinux Kernel Version3.0.32
LinuxLinux Kernel Version3.0.33
LinuxLinux Kernel Version3.0.34
LinuxLinux Kernel Version3.0.35
LinuxLinux Kernel Version3.0.36
LinuxLinux Kernel Version3.0.37
LinuxLinux Kernel Version3.0.38
LinuxLinux Kernel Version3.0.39
LinuxLinux Kernel Version3.0.40
LinuxLinux Kernel Version3.0.41
LinuxLinux Kernel Version3.0.42
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.27% 0.502
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.