CVE Vulnerabilities

CVE-2013-2852

Use of Externally-Controlled Format String

Published: Jun 07, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
6 LOW
AV:L/AC:H/Au:S/C:C/I:C/A:C
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux2.6.12 (including)3.0.83 (excluding)
Linux_kernelLinux3.1 (including)3.2.47 (excluding)
Linux_kernelLinux3.3 (including)3.4.50 (excluding)
Linux_kernelLinux3.5 (including)3.9.7 (excluding)
OpenStack 3 for RHEL 6RedHatkernel-0:2.6.32-358.114.1.openstack.el6*
Red Hat Enterprise Linux 6RedHatkernel-0:2.6.32-358.14.1.el6*
Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node OnlyRedHatkernel-0:2.6.32-279.37.2.el6*
Red Hat Enterprise MRG 2RedHatkernel-rt-0:3.6.11.5-rt37.55.el6rt*
LinuxUbuntulucid*
LinuxUbuntuprecise*
LinuxUbuntuprecise/esm*
LinuxUbuntuquantal*
LinuxUbunturaring*
LinuxUbuntuupstream*
Linux-armadaxpUbuntuprecise*
Linux-armadaxpUbuntuquantal*
Linux-armadaxpUbuntuupstream*
Linux-awsUbuntuupstream*
Linux-ec2Ubuntulucid*
Linux-ec2Ubuntuupstream*
Linux-floUbuntutrusty*
Linux-floUbuntutrusty/esm*
Linux-floUbuntuupstream*
Linux-floUbuntuutopic*
Linux-floUbuntuvivid*
Linux-floUbuntuvivid/stable-phone-overlay*
Linux-floUbuntuwily*
Linux-floUbuntuxenial*
Linux-floUbuntuyakkety*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-gkeUbuntuupstream*
Linux-goldfishUbuntusaucy*
Linux-goldfishUbuntutrusty*
Linux-goldfishUbuntutrusty/esm*
Linux-goldfishUbuntuupstream*
Linux-grouperUbuntusaucy*
Linux-grouperUbuntutrusty*
Linux-grouperUbuntuupstream*
Linux-grouperUbuntuutopic*
Linux-hweUbuntuupstream*
Linux-hwe-edgeUbuntuupstream*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-omapUbuntuquantal*
Linux-linaro-omapUbuntuupstream*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-sharedUbuntuquantal*
Linux-linaro-sharedUbuntuupstream*
Linux-linaro-vexpressUbuntuprecise*
Linux-linaro-vexpressUbuntuquantal*
Linux-linaro-vexpressUbuntuupstream*
Linux-lts-backport-maverickUbuntulucid*
Linux-lts-backport-maverickUbuntuupstream*
Linux-lts-quantalUbuntuprecise*
Linux-lts-quantalUbuntuupstream*
Linux-lts-raringUbuntuprecise*
Linux-lts-raringUbuntuupstream*
Linux-lts-trustyUbuntuupstream*
Linux-lts-utopicUbuntuupstream*
Linux-lts-vividUbuntuupstream*
Linux-lts-wilyUbuntuupstream*
Linux-lts-xenialUbuntuupstream*
Linux-maguroUbuntusaucy*
Linux-maguroUbuntutrusty*
Linux-maguroUbuntuupstream*
Linux-makoUbuntusaucy*
Linux-makoUbuntutrusty*
Linux-makoUbuntutrusty/esm*
Linux-makoUbuntuupstream*
Linux-makoUbuntuutopic*
Linux-makoUbuntuvivid*
Linux-makoUbuntuvivid/stable-phone-overlay*
Linux-makoUbuntuwily*
Linux-makoUbuntuxenial*
Linux-makoUbuntuyakkety*
Linux-mantaUbuntusaucy*
Linux-mantaUbuntutrusty*
Linux-mantaUbuntutrusty/esm*
Linux-mantaUbuntuupstream*
Linux-mantaUbuntuutopic*
Linux-mantaUbuntuvivid*
Linux-mantaUbuntuwily*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntuupstream*
Linux-qcm-msmUbuntulucid*
Linux-qcm-msmUbuntuprecise*
Linux-qcm-msmUbuntuquantal*
Linux-qcm-msmUbuntuupstream*
Linux-raspi2Ubuntuupstream*
Linux-raspi2Ubuntuvivid/ubuntu-core*
Linux-snapdragonUbuntuupstream*
Linux-ti-omap4Ubuntuprecise*
Linux-ti-omap4Ubuntuquantal*
Linux-ti-omap4Ubunturaring*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References