7.2

CVE-2010-2240

Exploit

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.27.51
LinuxLinux Kernel Version2.6.32
LinuxLinux Kernel Version2.6.32.1
LinuxLinux Kernel Version2.6.32.2
LinuxLinux Kernel Version2.6.32.3
LinuxLinux Kernel Version2.6.32.4
LinuxLinux Kernel Version2.6.32.5
LinuxLinux Kernel Version2.6.32.6
LinuxLinux Kernel Version2.6.32.7
LinuxLinux Kernel Version2.6.32.8
LinuxLinux Kernel Version2.6.32.9
LinuxLinux Kernel Version2.6.32.10
LinuxLinux Kernel Version2.6.32.11
LinuxLinux Kernel Version2.6.32.12
LinuxLinux Kernel Version2.6.32.13
LinuxLinux Kernel Version2.6.32.14
LinuxLinux Kernel Version2.6.32.15
LinuxLinux Kernel Version2.6.32.16
LinuxLinux Kernel Version2.6.32.17
LinuxLinux Kernel Version2.6.32.18
LinuxLinux Kernel Version2.6.34.1
LinuxLinux Kernel Version2.6.34.2
LinuxLinux Kernel Version2.6.34.3
LinuxLinux Kernel Version2.6.35.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.242
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.