CVE-2010-3873
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
La implementación de X.25 en el kernel de Linux anterior a v2.6.36.2 no analiza adecuadamente las instalaciones, lo que permite a atacantes remotos provocar una denegación de servicio (daños en el montón de memoria y el pánico) o posiblemente tener un impacto no especificado a través de formato incorrecto (1) X25_FAC_CALLING_AE o (2) Los datos X25_FAC_CALLED_AE, relacionados con net/x25/x25_facilities.c y net/x25/x25_in.c, una vulnerabilidad diferente de CVE-2010-4164.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-10-08 CVE Reserved
- 2010-11-29 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6331d6f9a4298173b413cf99a40cc86a9d92c37 | X_refsource_confirm | |
http://openwall.com/lists/oss-security/2010/11/03/2 | Mailing List | |
http://openwall.com/lists/oss-security/2010/11/04/3 | Mailing List | |
http://secunia.com/advisories/43291 | Third Party Advisory | |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 | Broken Link | |
http://www.vupen.com/english/advisories/2011/0375 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.spinics.net/lists/netdev/msg145786.html | 2023-02-13 | |
http://www.spinics.net/lists/netdev/msg145873.html | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=649693 | 2023-02-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.36.2 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.36.2" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.4 Search vendor "Opensuse" for product "Opensuse" and version "11.4" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 9 Search vendor "Suse" for product "Linux Enterprise Server" and version "9" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|