8.1

CVE-2010-2943

Exploit

The xfs implementation in the Linux kernel before 2.6.35 does not look up inode allocation btrees before reading inode buffers, which allows remote authenticated users to read unlinked files, or read or overwrite disk blocks that are currently assigned to an active file but were previously assigned to an unlinked file, by accessing a stale NFS filehandle.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.35
CanonicalUbuntu Linux Version6.06 SwEdition-
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
VMwareEsx Version4.0
VMwareEsx Version4.1
AvayaAura Presence Services Version6.0
AvayaAura Presence Services Version6.1
AvayaAura Presence Services Version6.1.1
AvayaAura Session Manager Version1.1
AvayaAura Session Manager Version5.2
AvayaAura Session Manager Version6.0
AvayaAura System Manager Version5.2
AvayaAura System Manager Version6.0
AvayaAura System Manager Version6.1
AvayaAura System Manager Version6.1.1
AvayaAura System Platform Version1.1
AvayaAura System Platform Version6.0 Update-
AvayaAura System Platform Version6.0 Updatesp1
AvayaAura Voice Portal Version5.0
AvayaAura Voice Portal Version5.1 Update-
AvayaAura Voice Portal Version5.1 Updatesp1
AvayaIq Version5.0
AvayaIq Version5.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.82% 0.877
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

http://www.openwall.com/lists/oss-security/2010/08/18/2
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/08/19/5
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/42527
Third Party Advisory
Exploit
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=624923
Patch
Third Party Advisory
Issue Tracking