// For flags

CVE-2010-2492

kernel: ecryptfs_uid_hash() buffer overflow

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.

Vulnerabilidad de desbordamiento de búfer en la macro ecryptfs_uid_hash en fs/ecryptfs/messaging.c del subsistema eCryptfs del kernel de Linux anterior a v2.6.35, podría permitir a a usuarios locales obtener privilegios o provocar una denegación de servicio (caída de sistema) a través de vectores no especificados.

Some vulnerabilities were discovered and corrected in the Linux kernel. Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service via unspecified vectors. The DNS resolution functionality in the CIFS implementation in the Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a user's keyring for the dns_resolver upcall in the cifs.upcall userspace helper, which allows local users to spoof the results of DNS queries and perform arbitrary CIFS mounts via vectors involving an add_key call, related to a cache stuffing issue and MS-DFS referrals. The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server. Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service via a write operation on the last block of a large file, followed by a sync operation.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-06-28 CVE Reserved
  • 2010-08-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-06-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 2.6.35
Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.35"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.0
Search vendor "Vmware" for product "Esx" and version "4.0"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.1
Search vendor "Vmware" for product "Esx" and version "4.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura Communication Manager
Search vendor "Avaya" for product "Aura Communication Manager"
5.2
Search vendor "Avaya" for product "Aura Communication Manager" and version "5.2"
-
Affected
Avaya
Search vendor "Avaya"
Aura Presence Services
Search vendor "Avaya" for product "Aura Presence Services"
6.0
Search vendor "Avaya" for product "Aura Presence Services" and version "6.0"
-
Affected
Avaya
Search vendor "Avaya"
Aura Presence Services
Search vendor "Avaya" for product "Aura Presence Services"
6.1
Search vendor "Avaya" for product "Aura Presence Services" and version "6.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura Presence Services
Search vendor "Avaya" for product "Aura Presence Services"
6.1.1
Search vendor "Avaya" for product "Aura Presence Services" and version "6.1.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura Session Manager
Search vendor "Avaya" for product "Aura Session Manager"
1.1
Search vendor "Avaya" for product "Aura Session Manager" and version "1.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura Session Manager
Search vendor "Avaya" for product "Aura Session Manager"
5.2
Search vendor "Avaya" for product "Aura Session Manager" and version "5.2"
-
Affected
Avaya
Search vendor "Avaya"
Aura Session Manager
Search vendor "Avaya" for product "Aura Session Manager"
6.0
Search vendor "Avaya" for product "Aura Session Manager" and version "6.0"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Manager
Search vendor "Avaya" for product "Aura System Manager"
5.2
Search vendor "Avaya" for product "Aura System Manager" and version "5.2"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Manager
Search vendor "Avaya" for product "Aura System Manager"
6.0
Search vendor "Avaya" for product "Aura System Manager" and version "6.0"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Manager
Search vendor "Avaya" for product "Aura System Manager"
6.1
Search vendor "Avaya" for product "Aura System Manager" and version "6.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Manager
Search vendor "Avaya" for product "Aura System Manager"
6.1.1
Search vendor "Avaya" for product "Aura System Manager" and version "6.1.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Platform
Search vendor "Avaya" for product "Aura System Platform"
1.1
Search vendor "Avaya" for product "Aura System Platform" and version "1.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Platform
Search vendor "Avaya" for product "Aura System Platform"
6.0
Search vendor "Avaya" for product "Aura System Platform" and version "6.0"
-
Affected
Avaya
Search vendor "Avaya"
Aura System Platform
Search vendor "Avaya" for product "Aura System Platform"
6.0
Search vendor "Avaya" for product "Aura System Platform" and version "6.0"
sp1
Affected
Avaya
Search vendor "Avaya"
Aura Voice Portal
Search vendor "Avaya" for product "Aura Voice Portal"
5.0
Search vendor "Avaya" for product "Aura Voice Portal" and version "5.0"
-
Affected
Avaya
Search vendor "Avaya"
Aura Voice Portal
Search vendor "Avaya" for product "Aura Voice Portal"
5.1
Search vendor "Avaya" for product "Aura Voice Portal" and version "5.1"
-
Affected
Avaya
Search vendor "Avaya"
Aura Voice Portal
Search vendor "Avaya" for product "Aura Voice Portal"
5.1
Search vendor "Avaya" for product "Aura Voice Portal" and version "5.1"
sp1
Affected
Avaya
Search vendor "Avaya"
Iq
Search vendor "Avaya" for product "Iq"
5.0
Search vendor "Avaya" for product "Iq" and version "5.0"
-
Affected
Avaya
Search vendor "Avaya"
Iq
Search vendor "Avaya" for product "Iq"
5.1
Search vendor "Avaya" for product "Iq" and version "5.1"
-
Affected