4
CVSSv2

CVE-2010-3874

Published: 29/12/2010 Updated: 13/02/2023
CVSS v2 Base Score: 4 | Impact Score: 6.9 | Exploitability Score: 1.9
VMScore: 357
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Summary

Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel prior to 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 13

suse linux enterprise desktop 11

suse linux enterprise server 11

opensuse opensuse 11.2

opensuse opensuse 11.3

suse linux enterprise real time extension 11

debian debian linux 5.0

Vendor Advisories

Multiple kernel flaws have been fixed ...
An attacker could send crafted input to the kernel and cause it to crash ...
Multiple kernel flaws have been fixed ...

Exploits

Ubuntu Security Notice 1202-1 - Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly A local user could exploit this to read kernel stack memory, leading to a loss of privacy Brad Spengler discovered that stack memory for new a process was not correctly calculated A local attacker could exploit this to crash ...

References

CWE-787https://bugzilla.redhat.com/show_bug.cgi?id=649695http://openwall.com/lists/oss-security/2010/12/21/1http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2http://openwall.com/lists/oss-security/2010/11/04/4http://www.spinics.net/lists/netdev/msg146469.htmlhttp://openwall.com/lists/oss-security/2010/12/20/3http://openwall.com/lists/oss-security/2010/11/03/3http://openwall.com/lists/oss-security/2010/12/20/4http://www.spinics.net/lists/netdev/msg145791.htmlhttp://openwall.com/lists/oss-security/2010/12/20/5http://openwall.com/lists/oss-security/2010/12/20/2http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.htmlhttp://www.vupen.com/english/advisories/2010/3321http://secunia.com/advisories/42745http://www.debian.org/security/2010/dsa-2126http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0958.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlhttp://secunia.com/advisories/42801http://www.vupen.com/english/advisories/2011/0012http://secunia.com/advisories/42778http://www.vupen.com/english/advisories/2011/0124http://secunia.com/advisories/42932http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.htmlhttp://www.redhat.com/support/errata/RHSA-2011-0007.htmlhttp://secunia.com/advisories/42890http://www.vupen.com/english/advisories/2011/0298http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:029http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84https://nvd.nist.govhttps://usn.ubuntu.com/1083-1/