1.2 CVE-2012-2313
Exploit Patch Ransomware Risk
The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2313
Categories
CWE-264
References
BID
53965 Third Party Advisory VDB Entry |
CONFIRM Patch Exploit
HP
HPSBGN02970 Third Party Advisory |
MISC
REDHAT
RHSA-2012:1174 Third Party Advisory |
RHSA-2012:1589 Third Party Advisory |
RHSA-2012:1481 Third Party Advisory |
RHSA-2012:1541 Third Party Advisory |
SUSE
SUSE-SU-2015:0812 Third Party Advisory |
_MLIST
CPE
ProHacktive is continuously improving the CVE entries in Nist to avoid false positives. This CVE has been modified and you will find an in front of each modified CPE.
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | <= 3.3.6 | |
cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:o:novell:suse_linux_enterprise_server:10.0:sp4:*:*:ltss:*:*:* | ||
Configuration 3 | ||
cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.1.z:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:5.6.z:*:server:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:server:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
MITRE
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
