1.9
CVSSv2

CVE-2010-4077

Published: 29/11/2010 Updated: 07/11/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 195
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and previous versions does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Multiple kernel flaws have been fixed ...
A local attacker could exploit this to run programs with admininstrator privileges ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...

Exploits

/* Linux <= 2637-rc1 serial_core TIOCGICOUNT leak * ================================================ * Information leak exploit for CVE-2010-4077 which * leaks kernel stack space back to userland due to * uninitialized struct member "reserved" in struct * serial_icounter_struct copied to userland uses * ioctl to trigger memory leak, d ...
Information leak exploit for Linux kernel versions 2637-rc1 and below which leaks kernel stack space back to userland due to uninitialized struct member "reserved" in struct serial_icounter_struct copied to userland Uses ioctl to trigger memory leak, dumps to file and displays to command line ...
Ubuntu Security Notice 1202-1 - Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly A local user could exploit this to read kernel stack memory, leading to a loss of privacy Brad Spengler discovered that stack memory for new a process was not correctly calculated A local attacker could exploit this to crash ...