The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
19 Dec 2024, 20:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.vsecurity.com/resources/advisory/20101019-1/ - Broken Link | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - Third Party Advisory | |
References | () http://securitytracker.com/id?1024613 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vsecurity.com/download/tools/linux-rds-exploit.c - Broken Link | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0792.html - Broken Link, Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-1000-1 - Third Party Advisory | |
References | () http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/46397 - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Broken Link, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=642896 - Issue Tracking, Patch, Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/362983 - Third Party Advisory, US Government Resource | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44677/ - Exploit, Third Party Advisory, VDB Entry | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 - Broken Link |
27 Jun 2024, 19:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1284 | |
First Time |
Vmware esxi
Vmware Redhat Redhat enterprise Linux |
|
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2011/0298 - Broken Link, Third Party Advisory | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0792.html - Broken Link, Third Party Advisory | |
References | (SECTRACK) http://securitytracker.com/id?1024613 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/520102/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/46397 - Broken Link, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CPE | cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* |
07 Nov 2023, 02:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2010-12-06 20:13
Updated : 2025-02-19 19:47
NVD link : CVE-2010-3904
Mitre link : CVE-2010-3904
JSON object : View
Products Affected
redhat
- enterprise_linux
canonical
- ubuntu_linux
suse
- linux_enterprise_real_time_extension
- linux_enterprise_server
- linux_enterprise_desktop
opensuse
- opensuse
vmware
- esxi
linux
- linux_kernel
CWE
CWE-1284
Improper Validation of Specified Quantity in Input