The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
References
Configurations
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - | |
References | () http://marc.info/?l=oss-security&m=127850299910685&w=2 - | |
References | () http://marc.info/?l=oss-security&m=127859390815405&w=2 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2010/07/06/5 - | |
References | () http://www.openwall.com/lists/oss-security/2010/07/07/4 - | |
References | () http://www.openwall.com/lists/oss-security/2010/07/09/1 - | |
References | () http://www.securityfocus.com/bid/41524 - |
Information
Published : 2010-07-13 17:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-2522
Mitre link : CVE-2010-2522
CVE.ORG link : CVE-2010-2522
JSON object : View
Products Affected
linux-ipv6
- umip
CWE
CWE-264
Permissions, Privileges, and Access Controls