Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2010-3301


The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.


Published

2010-09-22T19:00:03.323

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.2 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-269

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 2.6.36 Yes
Operating System linux linux_kernel 2.6.36 Yes
Operating System linux linux_kernel 2.6.36 Yes
Operating System linux linux_kernel 2.6.36 Yes
Operating System linux linux_kernel 2.6.36 Yes
Operating System suse linux_enterprise_real_time_extension 11 Yes
Operating System canonical ubuntu_linux 9.10 Yes
Operating System canonical ubuntu_linux 10.04 Yes
Operating System canonical ubuntu_linux 10.10 Yes

References