CVE-2013-1763

Linux Kernel < 3.4.34 - Improper Input Validation

Title source: rule

Description

Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.

Exploits (5)

exploitdb WORKING POC VERIFIED
by SynQ · clocallinux
https://www.exploit-db.com/exploits/33336
exploitdb WORKING POC
by Vitaly Nikolenko · clocallinux_x86-64
https://www.exploit-db.com/exploits/44299
exploitdb WORKING POC
by Kacper Szczesniak · clocallinux_x86-64
https://www.exploit-db.com/exploits/24746
exploitdb WORKING POC
by sd · clocallinux_x86-64
https://www.exploit-db.com/exploits/24555
nomisec WORKING POC
by qkrtjsrbs315 · poc
https://github.com/qkrtjsrbs315/CVE-2013-1763

Scores

EPSS 0.1636
EPSS Percentile 94.9%

Details

CWE
CWE-20
Status published
Products (1)
linux/linux_kernel 3.3 - 3.4.34
Published Feb 28, 2013
Tracked Since Feb 18, 2026