6.2
CVSSv2

CVE-2010-4258

Published: 30/12/2010 Updated: 13/02/2023
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 625
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

The do_exit function in kernel/exit.c in the Linux kernel prior to 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 13

suse linux enterprise server 10

suse linux enterprise desktop 11

suse linux enterprise server 11

suse linux enterprise server 9

opensuse opensuse 11.2

opensuse opensuse 11.3

suse linux enterprise desktop 10

suse linux enterprise software development kit 10

suse linux enterprise real time extension 11

Vendor Advisories

Multiple kernel flaws have been fixed ...
An attacker could send crafted input to the kernel and cause it to crash ...
Multiple security flaws have been fixed in the OMAP4 port of the Linux kernel ...
Multiple flaws fixed in the Linux kernel ...

Exploits

/* * Linux Kernel <= 2637 local privilege escalation * by Dan Rosenberg * @djrbliss on twitter * * Usage: * gcc full-nelsonc -o full-nelson * /full-nelson * * This exploit leverages three vulnerabilities to get root, all of which were * discovered by Nelson Elhage: * * CVE-2010-4258 * ------------- * This is the interesting one ...
Linux kernel local privilege escalation exploit for versions 2637 and below It leverages three separate vulnerabilities to achieve root including a NULL pointer dereference, being able to assign arbitrary Econet addresses to arbitrary interfaces, and the ability to write a NULL word to an arbitrary kernel address ...

Github Repositories

A simple virus of linux. It can get root and destory your system.(这是一个简单的linux下的病毒,它仅能得到root权限和感染文件并进行破坏)

About 这个是linux下病毒的一个最简易版本,包含的功能有: 得到root权限 感染文件 进行破坏 通过一些linux下的系统调用来实现的。 得到root权限是通过 CVE-2010-4258,CVE-2010-3849,CVE-2010-3850这三个漏洞,主要是Econnet protocol 的漏洞来实现的,并且只针对特定的Linux内核版本有效。

References

CWE-269http://openwall.com/lists/oss-security/2010/12/09/4http://openwall.com/lists/oss-security/2010/12/08/5http://openwall.com/lists/oss-security/2010/12/02/4http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.htmlhttp://openwall.com/lists/oss-security/2010/12/02/2https://bugzilla.redhat.com/show_bug.cgi?id=659567http://marc.info/?l=linux-kernel&m=129117048916957&w=2http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/http://openwall.com/lists/oss-security/2010/12/09/14http://openwall.com/lists/oss-security/2010/12/08/9http://openwall.com/lists/oss-security/2010/12/02/7http://openwall.com/lists/oss-security/2010/12/08/4https://lkml.org/lkml/2010/12/1/543http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2http://openwall.com/lists/oss-security/2010/12/02/3http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.htmlhttp://secunia.com/advisories/42745http://www.vupen.com/english/advisories/2010/3321http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlhttp://www.vupen.com/english/advisories/2011/0012http://secunia.com/advisories/42778http://secunia.com/advisories/42801http://secunia.com/advisories/42932http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.htmlhttp://www.vupen.com/english/advisories/2011/0124http://www.vupen.com/english/advisories/2011/0213http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.htmlhttp://secunia.com/advisories/43056http://www.vupen.com/english/advisories/2011/0375http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.htmlhttp://secunia.com/advisories/43291http://www.vupen.com/english/advisories/2011/0298http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:029http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.htmlhttp://code.google.com/p/chromium-os/issues/detail?id=10234http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177https://nvd.nist.govhttps://github.com/karottc/linux-virushttps://www.exploit-db.com/exploits/15704/https://usn.ubuntu.com/1083-1/