The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://secunia.com/advisories/46397 - Broken Link, Third Party Advisory | |
References | () http://securitytracker.com/id?1024613 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.kb.cert.org/vuls/id/362983 - Third Party Advisory, US Government Resource | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0792.html - Broken Link, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1000-1 - Third Party Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - Third Party Advisory | |
References | () http://www.vsecurity.com/download/tools/linux-rds-exploit.c - Broken Link | |
References | () http://www.vsecurity.com/resources/advisory/20101019-1/ - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Broken Link, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=642896 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44677/ - Exploit, Third Party Advisory, VDB Entry |
27 Jun 2024, 19:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1284 | |
CPE | cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
First Time |
Vmware
Vmware esxi Redhat Redhat enterprise Linux |
|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f - Broken Link | |
References | () http://secunia.com/advisories/46397 - Broken Link, Third Party Advisory | |
References | () http://securitytracker.com/id?1024613 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0792.html - Broken Link, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Broken Link, Third Party Advisory |
Information
Published : 2010-12-06 20:13
Updated : 2025-04-11 00:51
NVD link : CVE-2010-3904
Mitre link : CVE-2010-3904
CVE.ORG link : CVE-2010-3904
JSON object : View
Products Affected
redhat
- enterprise_linux
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_real_time_extension
opensuse
- opensuse
linux
- linux_kernel
canonical
- ubuntu_linux
vmware
- esxi
CWE
CWE-1284
Improper Validation of Specified Quantity in Input