CVE-2012-6689

HIGH

Linux Kernel < 3.0.44 - Improper Access Control

Title source: rule
STIX 2.1

Description

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

References (8)

Core 8
Core References
Release Notes, Vendor Advisory x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://marc.info/?l=linux-netdev&m=134522422925986&w=2
Broken Link, Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/72739
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=848949
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/02/22/10
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://marc.info/?l=linux-netdev&m=134522422125983&w=2

Scores

CVSS v3 7.8
EPSS 0.0003
EPSS Percentile 9.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-284
Status published
Products (1)
linux/linux_kernel < 3.0.44
Published May 02, 2016
Tracked Since Feb 18, 2026