CVE-2013-2852
Severity CVSS v4.0:
Pending analysis
Type:
CWE-134
Format String Vulnerability
Publication date:
07/06/2013
Last modified:
11/04/2025
Description
Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12 (including) | 3.0.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.1 (including) | 3.2.47 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.3 (including) | 3.4.50 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.5 (including) | 3.9.7 (excluding) |
| cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
- http://rhn.redhat.com/errata/RHSA-2013-1051.html
- http://rhn.redhat.com/errata/RHSA-2013-1450.html
- http://www.debian.org/security/2013/dsa-2766
- http://www.openwall.com/lists/oss-security/2013/06/06/13
- http://www.ubuntu.com/usn/USN-1899-1
- http://www.ubuntu.com/usn/USN-1900-1
- http://www.ubuntu.com/usn/USN-1914-1
- http://www.ubuntu.com/usn/USN-1915-1
- http://www.ubuntu.com/usn/USN-1916-1
- http://www.ubuntu.com/usn/USN-1917-1
- http://www.ubuntu.com/usn/USN-1918-1
- http://www.ubuntu.com/usn/USN-1919-1
- http://www.ubuntu.com/usn/USN-1920-1
- http://www.ubuntu.com/usn/USN-1930-1
- https://bugzilla.redhat.com/show_bug.cgi?id=969518
- http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
- http://rhn.redhat.com/errata/RHSA-2013-1051.html
- http://rhn.redhat.com/errata/RHSA-2013-1450.html
- http://www.debian.org/security/2013/dsa-2766
- http://www.openwall.com/lists/oss-security/2013/06/06/13
- http://www.ubuntu.com/usn/USN-1899-1
- http://www.ubuntu.com/usn/USN-1900-1
- http://www.ubuntu.com/usn/USN-1914-1
- http://www.ubuntu.com/usn/USN-1915-1
- http://www.ubuntu.com/usn/USN-1916-1
- http://www.ubuntu.com/usn/USN-1917-1
- http://www.ubuntu.com/usn/USN-1918-1
- http://www.ubuntu.com/usn/USN-1919-1
- http://www.ubuntu.com/usn/USN-1920-1
- http://www.ubuntu.com/usn/USN-1930-1
- https://bugzilla.redhat.com/show_bug.cgi?id=969518



