Vulnerability Name:

CVE-2011-4915 (CCN-177037)

Assigned:2011-12-23
Published:2012-01-10
Updated:2020-02-25
Summary:fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2011-4915

Source: MISC
Type: Patch, Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201

Source: MISC
Type: Patch, Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497

Source: MISC
Type: Third Party Advisory
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html

Source: MISC
Type: Exploit, Mailing List, Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/11/07/9

Source: XF
Type: UNKNOWN
linux-kernel-cve20114915-info-disc(177037)

Source: CCN
Type: Linux Kernel GIT Repository
procfs: add hidepid= and gid= mount options

Source: MISC
Type: Vendor Advisory
https://lkml.org/lkml/2011/11/7/340

Source: MISC
Type: Mailing List, Third Party Advisory
https://seclists.org/oss-sec/2011/q4/571

Source: MISC
Type: Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2011-4915

Source: MISC
Type: Third Party Advisory
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2011-4915

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version <= 3.1)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:3.1:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20114915000
    V
    CVE-2011-4915 on Ubuntu 12.04 LTS (precise) - low.
    2012-01-04
    oval:com.ubuntu.trusty:def:20114915000
    V
    CVE-2011-4915 on Ubuntu 14.04 LTS (trusty) - low.
    2012-01-04
    BACK
    linux linux kernel *
    canonical ubuntu linux 14.04
    debian debian linux 8.0
    debian debian linux 9.0
    debian debian linux 10.0
    linux linux kernel 3.1