1.9
CVSSv2

CVE-2010-4073

Published: 29/11/2010 Updated: 07/11/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 195
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The ipc subsystem in the Linux kernel prior to 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

suse linux enterprise server 10

suse linux enterprise desktop 11

suse linux enterprise server 11

suse linux enterprise server 9

opensuse opensuse 11.3

suse linux enterprise desktop 10

suse linux enterprise software development kit 10

suse linux enterprise real time extension 11

debian debian linux 5.0

Vendor Advisories

An attacker could send crafted input to the kernel and cause it to crash ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...

Exploits

/* * half-nelsonc * * Linux Kernel < 26362 Econet Privilege Escalation Exploit * Jon Oberheide <jon@oberheideorg> * jonoberheideorg * * Information: * * cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2010-3848 * * Stack-based buffer overflow in the econet_sendmsg function in * net/econet/af_econetc in ...
Ubuntu Security Notice 1202-1 - Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly A local user could exploit this to read kernel stack memory, leading to a loss of privacy Brad Spengler discovered that stack memory for new a process was not correctly calculated A local attacker could exploit this to crash ...
This exploit leverages three vulnerabilities to escalate privileges The primary vulnerability is a kernel stack overflow, not a stack buffer overflow as the CVE description incorrectly states This may be the first public exploit for a kernel stack overflow, and it turns out to be a bit tricky due to some particulars of the econet vulnerability I ...

References

CWE-200http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1http://lkml.org/lkml/2010/10/6/492https://bugzilla.redhat.com/show_bug.cgi?id=648658http://www.openwall.com/lists/oss-security/2010/10/25/3http://www.openwall.com/lists/oss-security/2010/10/07/1http://www.securityfocus.com/bid/45073http://www.debian.org/security/2010/dsa-2126http://www.redhat.com/support/errata/RHSA-2010-0958.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlhttp://www.vupen.com/english/advisories/2011/0012http://secunia.com/advisories/42778http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.htmlhttp://www.vupen.com/english/advisories/2011/0124http://secunia.com/advisories/42932http://secunia.com/advisories/42963http://www.redhat.com/support/errata/RHSA-2011-0162.htmlhttp://www.vupen.com/english/advisories/2011/0168http://secunia.com/advisories/42884http://secunia.com/advisories/42890http://www.redhat.com/support/errata/RHSA-2011-0007.htmlhttp://www.redhat.com/support/errata/RHSA-2011-0017.htmlhttp://www.vupen.com/english/advisories/2011/0298http://www.vupen.com/english/advisories/2011/0375http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlhttp://secunia.com/advisories/43291http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:029http://www.mandriva.com/security/advisories?name=MDVSA-2011:051http://securityreason.com/securityalert/8366http://secunia.com/advisories/46397http://www.vmware.com/security/advisories/VMSA-2011-0012.htmlhttp://www.securityfocus.com/archive/1/520102/100/0/threadedhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9https://nvd.nist.govhttps://www.exploit-db.com/exploits/17787/https://usn.ubuntu.com/1083-1/