TROYANOSYVIRUS
Volver a CVEs

CVE-2010-3904

HIGHCISA KEV
7.8

Descripcion

The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.

Detalles CVE

Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado12/6/2010
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorLinux
ProductoKernel
Nombre vulnerabilidadLinux Kernel Improper Input Validation Vulnerability
Fecha inclusion KEV2023-05-12
Fecha limite remediacion2023-06-02
Uso en ransomwareUnknown

Productos afectados

canonical:ubuntu_linuxlinux:linux_kernelopensuse:opensuseredhat:enterprise_linuxsuse:linux_enterprise_desktopsuse:linux_enterprise_real_time_extensionsuse:linux_enterprise_servervmware:esxi

Debilidades (CWE)

CWE-1284

Referencias

http://secunia.com/advisories/46397(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1024613(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/362983(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0792.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0842.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1000-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vsecurity.com/resources/advisory/20101019-1/(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0298(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=642896(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44677/(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.