Permissions, Privileges, and Access Controls in Linux kernel - CVE-2013-4470
Published: November 4, 2013 / Updated: August 10, 2020
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
How to mitigate CVE-2013-4470
Sources
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e93b7d748be887cd7639b113ba7d7ef792a7efb9
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2013-1801.html
- http://rhn.redhat.com/errata/RHSA-2014-0100.html
- http://rhn.redhat.com/errata/RHSA-2014-0284.html
- http://www.openwall.com/lists/oss-security/2013/10/25/5
- http://www.securityfocus.com/bid/63359
- http://www.ubuntu.com/usn/USN-2040-1
- http://www.ubuntu.com/usn/USN-2042-1
- http://www.ubuntu.com/usn/USN-2043-1
- http://www.ubuntu.com/usn/USN-2044-1
- http://www.ubuntu.com/usn/USN-2046-1
- http://www.ubuntu.com/usn/USN-2049-1
- http://www.ubuntu.com/usn/USN-2050-1
- http://www.ubuntu.com/usn/USN-2066-1
- http://www.ubuntu.com/usn/USN-2067-1
- http://www.ubuntu.com/usn/USN-2069-1
- http://www.ubuntu.com/usn/USN-2073-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1023477
- https://github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
- https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2