1.9

CVE-2010-4073

Exploit

The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.37
OpensuseOpensuse Version11.3
SuseLinux Enterprise Desktop Version10 Updatesp3
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Real Time Extension Version11 Updatesp1
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Updatesp1
DebianDebian Linux Version5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.24% 0.472
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

http://www.openwall.com/lists/oss-security/2010/10/07/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/10/25/3
Patch
Third Party Advisory
Mailing List
http://lkml.org/lkml/2010/10/6/492
Patch
Third Party Advisory
Mailing List
http://securityreason.com/securityalert/8366
Third Party Advisory
Exploit
http://www.securityfocus.com/bid/45073
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=648658
Patch
Third Party Advisory
Issue Tracking