2.1
CVSSv2

CVE-2014-0181

Published: 27/04/2014 Updated: 16/04/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Netlink implementation in the Linux kernel up to and including 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux server 5.0

suse linux enterprise server 11

opensuse evergreen 11.4

suse linux enterprise real time extension 11

redhat enterprise linux desktop 5

suse linux enterprise server 10

suse suse linux enterprise server 11

Vendor Advisories

Debian Bug report logs - #746738 CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: Henri Salo <henri@nervfi> Date: Sat, 3 May 2014 05:57:02 UTC Severity: important Tags: fixed ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process ...

Github Repositories

Linux Bluetooth - Run arbitrary management commands as an unprivileged user

Linux Bluetooth: Unauthorized management command execution (CVE-2023-2002) An insufficient permission check has been found in the Bluetooth subsystem of the Linux kernel when handling ioctl system calls of HCI sockets This causes tasks without the proper CAP_NET_ADMIN capability can easily mark HCI sockets as trusted Trusted sockets are intended to enable the sending and rece