6.9

CVE-2010-3859

Multiple integer signedness errors in the TIPC implementation in the Linux kernel before 2.6.36.2 allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.36.2
DebianDebian Linux Version5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.25
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://www.securityfocus.com/bid/44354
Third Party Advisory
VDB Entry
http://www.spinics.net/lists/netdev/msg145247.html
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145248.html
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145262.html
Patch
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145263.html
Patch
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145264.html
Patch
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145265.html
Patch
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145352.html
Patch
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=645867
Patch
Third Party Advisory
Issue Tracking