CVE-2013-7027
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
09/12/2013
Last modified:
11/04/2025
Description
The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.
Impact
Base Score 2.0
6.10
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.11.6 (including) | |
| cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Df5563318ff1bde15b10e736e97ffce13be08bc1a
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html
- http://secunia.com/advisories/55606
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.securityfocus.com/bid/64013
- http://www.securitytracker.com/id/1029413
- http://www.ubuntu.com/usn/USN-2066-1
- http://www.ubuntu.com/usn/USN-2067-1
- http://www.ubuntu.com/usn/USN-2068-1
- http://www.ubuntu.com/usn/USN-2069-1
- http://www.ubuntu.com/usn/USN-2071-1
- http://www.ubuntu.com/usn/USN-2072-1
- http://www.ubuntu.com/usn/USN-2073-1
- http://www.ubuntu.com/usn/USN-2074-1
- http://www.ubuntu.com/usn/USN-2076-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Df5563318ff1bde15b10e736e97ffce13be08bc1a
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html
- http://secunia.com/advisories/55606
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.securityfocus.com/bid/64013
- http://www.securitytracker.com/id/1029413
- http://www.ubuntu.com/usn/USN-2066-1
- http://www.ubuntu.com/usn/USN-2067-1
- http://www.ubuntu.com/usn/USN-2068-1
- http://www.ubuntu.com/usn/USN-2069-1
- http://www.ubuntu.com/usn/USN-2071-1
- http://www.ubuntu.com/usn/USN-2072-1
- http://www.ubuntu.com/usn/USN-2073-1
- http://www.ubuntu.com/usn/USN-2074-1
- http://www.ubuntu.com/usn/USN-2076-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a



