CVE-2012-4565
Published Dec 21, 2012
Last updated 2 years ago
Overview
- Description
- The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.7
- Impact score
- 6.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "616FD087-A19A-4413-B6EC-F859A35EADDC", "versionEndIncluding": "3.4.18" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" } ], "operator": "OR" } ] } ]