CVE-2013-6381
Kernel: qeth: buffer overflow in snmp ioctl
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
Desbordamiento de búfer en la función qeth_snmp_command de drivers/s390/net/qeth_core_main.c en el kernel de Linux hasta la versión 3.12.1 permite a usuarios locales provocar una denegación de servicio o posiblemente provocar otro impacto sin especificar a través de una llamada ioctl con un valor largo que es incompatible con el tamaño del búfer de comando.
The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's IPv6 implementation handled certain UDP packets when the UDP Fragmentation Offload feature was enabled. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the Linux kernel's TCP/IP protocol suite implementation handled sending of certain UDP packets over sockets that used the UDP_CORK option when the UDP Fragmentation Offload feature was enabled on the output device. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges on the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-11-04 CVE Reserved
- 2013-11-27 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-05-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | Broken Link | |
http://www.openwall.com/lists/oss-security/2013/11/22/5 | Mailing List |
|
http://www.securityfocus.com/bid/63890 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0159.html | 2024-04-26 | |
http://rhn.redhat.com/errata/RHSA-2014-0284.html | 2024-04-26 | |
http://rhn.redhat.com/errata/RHSA-2014-0285.html | 2024-04-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1033600 | 2014-05-07 | |
https://access.redhat.com/security/cve/CVE-2013-6381 | 2014-05-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.2.54 Search vendor "Linux" for product "Linux Kernel" and version " < 3.2.54" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.3 < 3.4.72 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.4.72" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.5 < 3.10.22 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.5 < 3.10.22" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 < 3.12.3 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.12.3" | - |
Affected
|