4

CVE-2010-3874

Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel HwPlatformx64 Version < 2.6.36.2
FedoraprojectFedora Version13
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Real Time Extension Version11 Updatesp1
SuseLinux Enterprise Server Version11 Updatesp1
DebianDebian Linux Version5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.241
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4 1.9 6.9
AV:L/AC:H/Au:N/C:N/I:N/A:C
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://openwall.com/lists/oss-security/2010/11/03/3
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/04/4
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/20/2
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/20/3
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/20/4
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/20/5
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/21/1
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg145791.html
Patch
Third Party Advisory
Mailing List
http://www.spinics.net/lists/netdev/msg146469.html
Patch
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=649695
Patch
Third Party Advisory
Issue Tracking