Vulnerability Name:

CVE-2012-2375 (CCN-76278)

Assigned:2012-03-22
Published:2012-03-22
Updated:2023-02-13
Summary:The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply.
Note: this vulnerability exists because of an incomplete fix for CVE-2011-4131.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C)
3.4 Low (Temporal CVSS v2 Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.6 Medium (REDHAT CVSS v2 Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C)
3.4 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2012-2375

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Linux Kernel GIT Repository
Fix length of buffer copied in __nfs4_get_acl_uncached

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2012-1580
Moderate: kernel security, bug fix and enhancement update

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2013-0566
Important: kernel-rt security and bug fix update

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla Bug 822869
CVE-2012-2375 kernel: incomplete fix for CVE-2011-4131

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
kernel-nfs4getacluncached-dos(76278)

Source: secalert@redhat.com
Type: Exploit, Patch
secalert@redhat.com

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20122375
    V
    CVE-2012-2375
    2022-05-20
    oval:org.mitre.oval:def:26913
    P
    ELSA-2012-2047 -- Unbreakable Enterprise kernel security update (moderate)
    2014-12-15
    oval:org.mitre.oval:def:17787
    P
    USN-1490-1 -- linux-lts-backport-natty vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17193
    P
    USN-1487-1 -- linux vulnerability
    2014-06-30
    oval:org.mitre.oval:def:17853
    P
    USN-1494-1 -- linux-ti-omap4 vulnerability
    2014-06-30
    oval:org.mitre.oval:def:17577
    P
    USN-1489-1 -- linux-lts-backport-oneiric vulnerability
    2014-06-30
    oval:org.mitre.oval:def:17898
    P
    USN-1486-1 -- linux vulnerability
    2014-06-30
    oval:org.mitre.oval:def:17606
    P
    USN-1499-1 -- linux-ti-omap4 vulnerability
    2014-06-30
    oval:org.mitre.oval:def:17924
    P
    USN-1488-1 -- linux vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17179
    P
    USN-1530-1 -- Linux kernel (OMAP4) vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:23871
    P
    ELSA-2012:1580: kernel security, bug fix and enhancement update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:20699
    P
    RHSA-2012:1580: kernel security, bug fix and enhancement update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20121580
    P
    RHSA-2012:1580: kernel security, bug fix and enhancement update (Moderate)
    2012-12-18
    oval:com.ubuntu.precise:def:20122375000
    V
    CVE-2012-2375 on Ubuntu 12.04 LTS (precise) - medium.
    2012-06-13
    oval:com.ubuntu.trusty:def:20122375000
    V
    CVE-2012-2375 on Ubuntu 14.04 LTS (trusty) - medium.
    2012-06-13
    BACK
    linux linux kernel 3.3 rc7
    linux linux kernel 3.3 rc4
    linux linux kernel 3.3 rc3
    linux linux kernel 3.3 rc6
    linux linux kernel 3.3 rc5
    linux linux kernel 3.3 rc2
    linux linux kernel 3.3 rc1
    linux linux kernel 3.3
    linux linux kernel 3.3.1
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise mrg 2.0