7.8

CVE-2010-3081

Exploit

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.35.4
LinuxLinux Kernel Version2.6.36 Update-
LinuxLinux Kernel Version2.6.36 Updaterc1
LinuxLinux Kernel Version2.6.36 Updaterc2
LinuxLinux Kernel Version2.6.36 Updaterc3
VMwareEsx Version4.0
VMwareEsx Version4.1
SuseSuse Linux Enterprise Desktop Version11 Updatesp1
SuseSuse Linux Enterprise Server Version11 Updatesp1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 21.72% 0.955
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://marc.info/?l=oss-security&m=128461522230211&w=2
Patch
Third Party Advisory
Mailing List
https://access.redhat.com/kb/docs/DOC-40265
Patch
Third Party Advisory
Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=634457
Patch
Third Party Advisory
Issue Tracking