The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://secunia.com/advisories/46397 - Broken Link, Third Party Advisory | |
References | () http://securitytracker.com/id?1024613 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.kb.cert.org/vuls/id/362983 - Third Party Advisory, US Government Resource | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0792.html - Broken Link, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1000-1 - Third Party Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - Third Party Advisory | |
References | () http://www.vsecurity.com/download/tools/linux-rds-exploit.c - Broken Link | |
References | () http://www.vsecurity.com/resources/advisory/20101019-1/ - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Broken Link, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=642896 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44677/ - Exploit, Third Party Advisory, VDB Entry |
27 Jun 2024, 19:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* |
|
CWE | CWE-1284 | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f - Broken Link | |
References | () http://secunia.com/advisories/46397 - Broken Link, Third Party Advisory | |
References | () http://securitytracker.com/id?1024613 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0792.html - Broken Link, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Broken Link, Third Party Advisory | |
First Time |
Redhat enterprise Linux
Vmware esxi Vmware Redhat |
07 Nov 2023, 02:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2010-12-06 20:13
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3904
Mitre link : CVE-2010-3904
CVE.ORG link : CVE-2010-3904
JSON object : View
Products Affected
opensuse
- opensuse
redhat
- enterprise_linux
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_real_time_extension
canonical
- ubuntu_linux
vmware
- esxi
linux
- linux_kernel
CWE
CWE-1284
Improper Validation of Specified Quantity in Input