6.9
CVSSv2

CVE-2010-3848

Published: 30/12/2010 Updated: 13/02/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 695
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel prior to 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

suse linux enterprise server 10

suse linux enterprise server 9

suse linux enterprise desktop 10

suse linux enterprise software development kit 10

suse linux enterprise real time extension 11

debian debian linux 5.0

canonical ubuntu linux 10.10

canonical ubuntu linux 9.10

canonical ubuntu linux 8.04

canonical ubuntu linux 10.04

canonical ubuntu linux 6.06

Vendor Advisories

An attacker could send crafted input to the kernel and cause it to crash ...
Multiple security flaws have been fixed in the OMAP4 port of the Linux kernel ...
The Linux kernel could be made to run unauthorized programs with administrator privileges ...

Exploits

/* * half-nelsonc * * Linux Kernel < 26362 Econet Privilege Escalation Exploit * Jon Oberheide <jon@oberheideorg> * jonoberheideorg * * Information: * * cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2010-3848 * * Stack-based buffer overflow in the econet_sendmsg function in * net/econet/af_econetc in ...
This exploit leverages three vulnerabilities to escalate privileges The primary vulnerability is a kernel stack overflow, not a stack buffer overflow as the CVE description incorrectly states This may be the first public exploit for a kernel stack overflow, and it turns out to be a bit tricky due to some particulars of the econet vulnerability I ...