6.9

CVE-2010-4160

Exploit

Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.36.2
OpensuseOpensuse Version11.2
SuseLinux Enterprise Desktop Version10 Updatesp3
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Updatesp1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.16% 0.337
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-190 Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.

http://www.spinics.net/lists/netdev/msg145248.html
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/10/16
Patch
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/10/5
Patch
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/24/12
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/24/4
Patch
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/24/5
Patch
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/11/24/6
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/44762
Third Party Advisory
VDB Entry
http://www.spinics.net/lists/netdev/msg145673.html
Patch
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=651892
Patch
Third Party Advisory
Issue Tracking