CVE-2010-3877
kernel: net/tipc/socket.c: reading uninitialized stack memory
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
La función get_Name en net/tipc/socket.c en el kernel de Linux anterior a v2.6.37-rc2 no inicia una determinada estructura, que permite a usuarios locales obtener información sensible de la pila del núcleo de memoria mediante la lectura de una copia de esta estructura.
Multiple vulnerabilities have been discovered and fixed in the Linux 2.6 kernel. The X.25 implementation does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed data, a different vulnerability than CVE-2010-4164. The bcm_connect function Broadcast Manager in the Controller Area Network implementation in the Linux creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename. The install_special_mapping function in mm/mmap.c does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application. Various other issues have also been addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-10-08 CVE Reserved
- 2010-11-29 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-909: Missing Initialization of Resource
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52 | X_refsource_confirm | |
http://secunia.com/advisories/42884 | Third Party Advisory | |
http://secunia.com/advisories/46397 | Third Party Advisory | |
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 | Broken Link | |
http://www.securityfocus.com/archive/1/520102/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/44630 | Third Party Advisory | |
http://www.vmware.com/security/advisories/VMSA-2011-0012.html | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64578 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://marc.info/?l=linux-netdev&m=128854507420917&w=2 | 2023-02-13 | |
http://openwall.com/lists/oss-security/2010/11/02/7 | 2023-02-13 | |
http://openwall.com/lists/oss-security/2010/11/04/5 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=649717 | 2011-01-13 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2010/dsa-2126 | 2023-02-13 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 | 2023-02-13 | |
http://www.redhat.com/support/errata/RHSA-2011-0017.html | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2010-3877 | 2011-01-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.37 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.37" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.37 Search vendor "Linux" for product "Linux Kernel" and version "2.6.37" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.37 Search vendor "Linux" for product "Linux Kernel" and version "2.6.37" | rc1 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|