CVE-2011-1078 Details

CVE-2011-1078

Published: 2012-06-21
Last Modified: 2015-05-06
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 1.9/10
Exploit Score 3.4/10
Access Vector Local
Access Complexity Medium
Authentication None
Impact Score 2.9/10
Confidentiality Impact Partial
Availability Impact None
Integrity Impact None
Vector String AV:L/AC:M/Au:N/C:P/I:N/A:N
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:linux:linux_kernel:2.6.38:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:2.6.38.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* Yes - -
References

http://downloads.avaya.com/css/P8/documents/100145416
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4c896e1471aec3b004a693c689f60be3b17ac86
http://rhn.redhat.com/errata/RHSA-2011-0833.html
http://rhn.redhat.com/errata/RHSA-2012-1156.html
http://www.openwall.com/lists/oss-security/2011/03/01/10
https://bugzilla.redhat.com/show_bug.cgi?id=681259
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86

CVE ID
CVE-2011-1078
Published
2012-06-21
Modified
2015-05-06
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE-200

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.