CVE-2010-3904
KEV
🔴 Łataj teraz
Błąd walidacji adresów w protokole RDS w jądrze Linux umożliwia lokalnym użytkownikom eskalację uprawnień.
CVSS
7.8
EPSS
1.5%
Exploit
weaponized
Vendor
canonical
Opis źródłowy (NVD)
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 1.5% |
| Opublikowano (NVD) | 2010-12-06 20:13:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 17:29:12 UTC |
Referencje
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f (security@ubuntu.com) [Broken Link]
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html (security@ubuntu.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html (security@ubuntu.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html (security@ubuntu.com) [Mailing List, Third Party Advisory]
- http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html (security@ubuntu.com) [Exploit, Third Party Advisory, VDB Entry]
- http://secunia.com/advisories/46397 (security@ubuntu.com) [Broken Link, Third Party Advisory]
- http://securitytracker.com/id?1024613 (security@ubuntu.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.kb.cert.org/vuls/id/362983 (security@ubuntu.com) [Third Party Advisory, US Government Resource]
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (security@ubuntu.com) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2010-0792.html (security@ubuntu.com) [Broken Link, Third Party Advisory]
- http://www.redhat.com/support/errata/RHSA-2010-0842.html (security@ubuntu.com) [Broken Link, Third Party Advisory]
- http://www.securityfocus.com/archive/1/520102/100/0/threaded (security@ubuntu.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.ubuntu.com/usn/USN-1000-1 (security@ubuntu.com) [Third Party Advisory]
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html (security@ubuntu.com) [Third Party Advisory]
- http://www.vsecurity.com/download/tools/linux-rds-exploit.c (security@ubuntu.com) [Broken Link]
- http://www.vsecurity.com/resources/advisory/20101019-1/ (security@ubuntu.com) [Broken Link]
- http://www.vupen.com/english/advisories/2011/0298 (security@ubuntu.com) [Broken Link, Third Party Advisory]
- https://bugzilla.redhat.com/show_bug.cgi?id=642896 (security@ubuntu.com) [Issue Tracking, Patch, Third Party Advisory]
- https://www.exploit-db.com/exploits/44677/ (security@ubuntu.com) [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-3904 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]