The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2010/07/07/4 | mailing list |
http://www.openwall.com/lists/oss-security/2010/07/06/5 | mailing list |
http://www.openwall.com/lists/oss-security/2010/07/09/1 | mailing list |
http://marc.info/?l=oss-security&m=127850299910685&w=2 | mailing list |
http://marc.info/?l=oss-security&m=127859390815405&w=2 | mailing list patch |
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html | vendor advisory |
http://www.securityfocus.com/bid/41524 | vdb entry |