ID |
CVE-2012-1568
|
Summary |
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
|
CVSS |
Base: | 1.9 (as of 13-02-2023 - 04:33) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-noinfo |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:L/AC:M/Au:N/C:N/I:P/A:N
|
redhat
via4
|
rpms | - kernel-0:2.6.32-279.14.1.el6
- kernel-bootwrapper-0:2.6.32-279.14.1.el6
- kernel-debug-0:2.6.32-279.14.1.el6
- kernel-debug-debuginfo-0:2.6.32-279.14.1.el6
- kernel-debug-devel-0:2.6.32-279.14.1.el6
- kernel-debuginfo-0:2.6.32-279.14.1.el6
- kernel-debuginfo-common-i686-0:2.6.32-279.14.1.el6
- kernel-debuginfo-common-ppc64-0:2.6.32-279.14.1.el6
- kernel-debuginfo-common-s390x-0:2.6.32-279.14.1.el6
- kernel-debuginfo-common-x86_64-0:2.6.32-279.14.1.el6
- kernel-devel-0:2.6.32-279.14.1.el6
- kernel-doc-0:2.6.32-279.14.1.el6
- kernel-firmware-0:2.6.32-279.14.1.el6
- kernel-headers-0:2.6.32-279.14.1.el6
- kernel-kdump-0:2.6.32-279.14.1.el6
- kernel-kdump-debuginfo-0:2.6.32-279.14.1.el6
- kernel-kdump-devel-0:2.6.32-279.14.1.el6
- perf-0:2.6.32-279.14.1.el6
- perf-debuginfo-0:2.6.32-279.14.1.el6
- python-perf-0:2.6.32-279.14.1.el6
- python-perf-debuginfo-0:2.6.32-279.14.1.el6
- kernel-0:2.6.18-348.1.1.el5
- kernel-PAE-0:2.6.18-348.1.1.el5
- kernel-PAE-debuginfo-0:2.6.18-348.1.1.el5
- kernel-PAE-devel-0:2.6.18-348.1.1.el5
- kernel-debug-0:2.6.18-348.1.1.el5
- kernel-debug-debuginfo-0:2.6.18-348.1.1.el5
- kernel-debug-devel-0:2.6.18-348.1.1.el5
- kernel-debuginfo-0:2.6.18-348.1.1.el5
- kernel-debuginfo-common-0:2.6.18-348.1.1.el5
- kernel-devel-0:2.6.18-348.1.1.el5
- kernel-doc-0:2.6.18-348.1.1.el5
- kernel-headers-0:2.6.18-348.1.1.el5
- kernel-kdump-0:2.6.18-348.1.1.el5
- kernel-kdump-debuginfo-0:2.6.18-348.1.1.el5
- kernel-kdump-devel-0:2.6.18-348.1.1.el5
- kernel-xen-0:2.6.18-348.1.1.el5
- kernel-xen-debuginfo-0:2.6.18-348.1.1.el5
- kernel-xen-devel-0:2.6.18-348.1.1.el5
|
|
refmap
via4
|
|
Last major update |
13-02-2023 - 04:33 |
Published |
01-03-2013 - 05:40 |
Last modified |
13-02-2023 - 04:33 |