Vulnerability Name: | CVE-2012-6712 (CCN-169545) | ||||||||||||||||
Assigned: | 2012-01-06 | ||||||||||||||||
Published: | 2012-01-06 | ||||||||||||||||
Updated: | 2022-11-03 | ||||||||||||||||
Summary: | In the Linux kernel before 3.4, a buffer overflow occurs in drivers/net/wireless/iwlwifi/iwl-agn-sta.c, which will cause at least memory corruption. | ||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-6712 Source: CCN Type: The Linux Kernel Archives Web site The Linux Kernel Archives Source: XF Type: UNKNOWN linux-kernel-cve20126712-bo(169545) Source: MISC Type: Patch, Vendor Advisory https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2da424b0773cea3db47e1e81db71eeebde8269d4 Source: CCN Type: Linux GitHub repository iwlwifi: Sanity check for sta_id Source: MISC Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/2da424b0773cea3db47e1e81db71eeebde8269d4 Source: MISC Type: Broken Link https://mirrors.edge.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4 Source: CCN Type: WhiteSource Vulnerability Database CVE-2012-6712 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |