Published: 08/09/2010 Updated: 13/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel prior to 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

vmware esx 4.0

vmware esx 4.1

avaya aura communication manager 5.2

avaya aura presence services 6.0

avaya aura presence services 6.1

avaya aura presence services 6.1.1

avaya aura session manager 1.1

avaya aura session manager 5.2

avaya aura session manager 6.0

avaya aura system manager 5.2

avaya aura system manager 6.0

avaya aura system manager 6.1

avaya aura system manager 6.1.1

avaya aura system platform 1.1

avaya aura system platform 6.0

avaya aura voice portal 5.0

avaya aura voice portal 5.1

avaya iq 5.0

avaya iq 5.1

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant secur ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-2492 Andre Osterhues reported an issue in the eCryptfs subsystem A buffer overflow condition may allow ...