Required CVE Record Information
Description
The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
References 7 Total
- openwall.com: [oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-list
- openwall.com: [oss-security] 20100706 patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-list
- openwall.com: [oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-list
- marc.info: [oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-list
- marc.info: [oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-list
- lists.opensuse.org: SUSE-SR:2010:019 vendor-advisory
- securityfocus.com: 41524 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- openwall.com: [oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-listx_transferred
- openwall.com: [oss-security] 20100706 patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-listx_transferred
- openwall.com: [oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-listx_transferred
- marc.info: [oss-security] 20100707 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-listx_transferred
- marc.info: [oss-security] 20100708 Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon mailing-listx_transferred
- lists.opensuse.org: SUSE-SR:2010:019 vendor-advisoryx_transferred
- securityfocus.com: 41524 vdb-entryx_transferred