Vulnerability Name: | CVE-2013-1763 (CCN-82327) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2013-02-25 | ||||||||||||||||||||||||||||||||||||
Published: | 2013-02-25 | ||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||
Summary: | |||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-1763 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2013-0622 Important: kernel-rt security and bug fix update Source: CCN Type: SA52289 Linux Kernel "__sock_diag_rcv_msg()" Privilege Escalation Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: The Linux Kernel Archives Web site The Linux Kernel Archives Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-58137 Linux Kernel CVE-2013-1763 Local Privilege Escalation Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 915052 CVE-2013-1763 kernel: sock_diag: out-of-bounds access to sock_diag_handlers Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN kernel-sockdiag-priv-esc(82327) Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: CCN Type: Packet Storm Security [02-26-2013] Archlinux/x86-64 3.3.x-3.7.x x86-64 sock_diag_handlers[] Local Root Source: CCN Type: Packet Storm Security [03-11-2013] Ubuntu 12.10 64bit Local Root Source: CCN Type: Packet Storm Security [03-13-2013] Fedora Linux SOCK_DIAG Local Root Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [02-27-2013] Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-13-2013] Source: EXPLOIT-DB Type: EXPLOIT Offensive Exploit Database [05-13-2014] | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |