Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-1172
Description:net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
Test IDs: 1.3.6.1.4.1.25623.1.0.71938   1.3.6.1.4.1.25623.1.1.4.2012.0115.2   1.3.6.1.4.1.25623.1.1.1.1.2011.2240   1.3.6.1.4.1.25623.1.0.69778   1.3.6.1.4.1.25623.1.1.4.2012.0115.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-1172
8278
http://securityreason.com/securityalert/8278
RHSA-2011:0833
http://rhn.redhat.com/errata/RHSA-2011-0833.html
[linux-kernel] 20110310 [PATCH] ipv6: netfilter: ip6_tables: fix infoleak to userspace
http://marc.info/?l=linux-kernel&m=129978086410061&w=2
[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks
http://www.openwall.com/lists/oss-security/2011/03/18/15
[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
http://www.openwall.com/lists/oss-security/2011/03/21/1
[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
http://www.openwall.com/lists/oss-security/2011/03/21/4
http://downloads.avaya.com/css/P8/documents/100145416
http://downloads.avaya.com/css/P8/documents/100145416
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6a8ab060779779de8aea92ce3337ca348f973f54
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6a8ab060779779de8aea92ce3337ca348f973f54
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
https://bugzilla.redhat.com/show_bug.cgi?id=689345
https://bugzilla.redhat.com/show_bug.cgi?id=689345




© 1998-2025 E-Soft Inc. All rights reserved.