4.9
CVE-2013-3076
- EPSS 0.06%
- Published 22.04.2013 11:40:59
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Updaterc7 Version <= 3.9
Linux ≫ Linux Kernel Version3.9 Updaterc1
Linux ≫ Linux Kernel Version3.9 Updaterc2
Linux ≫ Linux Kernel Version3.9 Updaterc3
Linux ≫ Linux Kernel Version3.9 Updaterc4
Linux ≫ Linux Kernel Version3.9 Updaterc5
Linux ≫ Linux Kernel Version3.9 Updaterc6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.181 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.9 | 3.9 | 6.9 |
AV:L/AC:L/Au:N/C:C/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.