CVE Vulnerabilities

CVE-2012-4516

Published: Oct 22, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
1.2 LOW
AV:L/AC:H/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.

Affected Software

NameVendorStart VersionEnd Version
LibrdmacmOpenfabrics1.0.16 (including)1.0.16 (including)
Red Hat Enterprise Linux 6RedHatibutils-0:1.5.7-8.el6*
Red Hat Enterprise Linux 6RedHatinfinipath-psm-0:3.0.1-115.1015_open.2.el6*
Red Hat Enterprise Linux 6RedHatlibibverbs-0:1.1.7-1.el6*
Red Hat Enterprise Linux 6RedHatlibmlx4-0:1.0.5-4.el6.1*
Red Hat Enterprise Linux 6RedHatlibrdmacm-0:1.0.17-1.el6*
Red Hat Enterprise Linux 6RedHatmpitests-0:3.2-9.el6*
Red Hat Enterprise Linux 6RedHatmstflint-0:3.0-0.6.g6961daa.1.el6*
Red Hat Enterprise Linux 6RedHatopenmpi-0:1.5.4-2.el6*
Red Hat Enterprise Linux 6RedHatperftest-0:2.0-2.el6*
Red Hat Enterprise Linux 6RedHatqperf-0:0.4.9-1.el6*
Red Hat Enterprise Linux 6RedHatrdma-0:3.10-3.el6*
LibrdmacmUbuntuartful*
LibrdmacmUbuntuesm-infra-legacy/trusty*
LibrdmacmUbuntuoneiric*
LibrdmacmUbuntuprecise*
LibrdmacmUbuntuprecise/esm*
LibrdmacmUbuntuquantal*
LibrdmacmUbunturaring*
LibrdmacmUbuntusaucy*
LibrdmacmUbuntutrusty*
LibrdmacmUbuntutrusty/esm*
LibrdmacmUbuntuutopic*
LibrdmacmUbuntuvivid*
LibrdmacmUbuntuwily*
LibrdmacmUbuntuyakkety*
LibrdmacmUbuntuzesty*

References