8.3 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.4%
Timo Warns discovered that the EFI GUID partition table was not correctly
parsed. A physically local attacker that could insert mountable devices
could exploit this to crash the system or possibly gain root privileges.
(CVE-2011-1776)
Dan Rosenberg discovered that the IPv4 diagnostic routines did not
correctly validate certain requests. A local attacker could exploit this to
consume CPU resources, leading to a denial of service. (CVE-2011-2213)
Dan Rosenberg discovered that the Bluetooth stack incorrectly handled
certain L2CAP requests. If a system was using Bluetooth, a remote attacker
could send specially crafted traffic to crash the system or gain root
privileges. (CVE-2011-2497)
Fernando Gont discovered that the IPv6 stack used predictable fragment
identification numbers. A remote attacker could exploit this to exhaust
network resources, leading to a denial of service. (CVE-2011-2699)
Time Warns discovered that long symlinks were incorrectly handled on Be
filesystems. A local attacker could exploit this with a malformed Be
filesystem and crash the system, leading to a denial of service.
(CVE-2011-2928)
Darren Lavender discovered that the CIFS client incorrectly handled certain
large values. A remote attacker with a malicious server could exploit this
to crash the system or possibly execute arbitrary code as the root user.
(CVE-2011-3191)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 8.04 | noarch | linux-image-2.6.24-29-sparc64 | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | acpi-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | block-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | crypto-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | fat-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | fb-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | firewire-core-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | floppy-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | fs-core-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
Ubuntu | 8.04 | noarch | fs-secondary-modules-2.6.24-29-generic-di | < 2.6.24-29.94 | UNKNOWN |
8.3 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.4%