Lucene search

K
cve[email protected]CVE-2014-0181
HistoryApr 27, 2014 - 12:55 a.m.

CVE-2014-0181

2014-04-2700:55:05
CWE-264
web.nvd.nist.gov
96
netlink
linux kernel
cve-2014-0181
security
access restrictions
network configurations

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.14.1
Node
opensuseevergreenMatch11.4
OR
redhatenterprise_linux_desktopMatch5
OR
redhatenterprise_linux_serverMatch5.0
OR
suselinux_enterprise_real_time_extensionMatch11sp3
OR
suselinux_enterprise_serverMatch10sp4ltss
OR
suselinux_enterprise_serverMatch11sp1ltss
OR
susesuse_linux_enterprise_serverMatch11

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%