4.9
CVSSv2

CVE-2010-4249

Published: 29/11/2010 Updated: 13/02/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 495
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel prior to 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.37

linux linux kernel

fedoraproject fedora 13

Vendor Advisories

An attacker could send crafted input to the kernel and cause it to crash ...
Multiple security flaws have been fixed in the OMAP4 port of the Linux kernel ...
Multiple flaws fixed in the Linux kernel ...
Multiple kernel flaws have been fixed ...

Exploits

/* Simple kernel attack using socketpair easy, 100% reproductiblle, works under guest no way to protect :( Simple kernel attack using socketpair easy, 100% reproductiblle, works under guest no way to protect :( See source attached Process become in state 'Running' but not killalble via kill -KILL eat 100% CPU, eat all available internal ...