CISA KEV 정보
| 취약점명 | Linux Kernel Improper Input Validation Vulnerability |
|---|---|
| 설명 | Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls. |
| 조치사항 | The impacted product is end-of-life and should be disconnected if still in use. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-20 |
| 등록일 (KEV) | 2023-05-12 |
| 조치 기한 | 2023-06-02 |
| 추가 참고 | https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
CWE: CWE-1284
참조
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f [Broken Link]
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html [Mailing List, Third Party Advisory]
- http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html [Exploit, Third Party Advisory, VDB Entry]
- http://secunia.com/advisories/46397 [Broken Link, Third Party Advisory]
- http://securitytracker.com/id?1024613 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.kb.cert.org/vuls/id/362983 [Third Party Advisory, US Government Resource]
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2010-0792.html [Broken Link, Third Party Advisory]
- http://www.redhat.com/support/errata/RHSA-2010-0842.html [Broken Link, Third Party Advisory]
- http://www.securityfocus.com/archive/1/520102/100/0/threaded [Broken Link, Third Party Advisory, VDB Entry]
- http://www.ubuntu.com/usn/USN-1000-1 [Third Party Advisory]
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html [Third Party Advisory]
- http://www.vsecurity.com/download/tools/linux-rds-exploit.c [Broken Link]
- ... 외 24건
This product uses the NVD API but is not endorsed or certified by the NVD.