Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-1171
Description:net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
Test IDs: 1.3.6.1.4.1.25623.1.1.4.2012.0115.2   1.3.6.1.4.1.25623.1.1.1.1.2011.2240   1.3.6.1.4.1.25623.1.1.4.2012.0115.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-1171
8278
http://securityreason.com/securityalert/8278
8283
http://securityreason.com/securityalert/8283
RHSA-2011:0833
http://rhn.redhat.com/errata/RHSA-2011-0833.html
[linux-kernel] 20110310 [PATCH] ipv4: netfilter: ip_tables: fix infoleak to userspace
http://marc.info/?l=linux-kernel&m=129978077609894&w=2
[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks
http://www.openwall.com/lists/oss-security/2011/03/18/15
[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
http://www.openwall.com/lists/oss-security/2011/03/21/1
[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
http://www.openwall.com/lists/oss-security/2011/03/21/4
http://downloads.avaya.com/css/P8/documents/100145416
http://downloads.avaya.com/css/P8/documents/100145416
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
https://bugzilla.redhat.com/show_bug.cgi?id=689327
https://bugzilla.redhat.com/show_bug.cgi?id=689327




© 1998-2025 E-Soft Inc. All rights reserved.