Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2010-3904


The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.


Published

2010-12-06T20:13:00.513

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-1284

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 2.6.36 Yes
Operating System opensuse opensuse 11.2 Yes
Operating System opensuse opensuse 11.3 Yes
Operating System suse linux_enterprise_desktop 11 Yes
Operating System suse linux_enterprise_real_time_extension 11 Yes
Operating System suse linux_enterprise_server 11 Yes
Operating System canonical ubuntu_linux 6.06 Yes
Operating System canonical ubuntu_linux 8.04 Yes
Operating System canonical ubuntu_linux 9.04 Yes
Operating System canonical ubuntu_linux 9.10 Yes
Operating System canonical ubuntu_linux 10.04 Yes
Operating System canonical ubuntu_linux 10.10 Yes
Operating System redhat enterprise_linux 5.0 Yes
Operating System redhat enterprise_linux 6.0 Yes
Operating System vmware esxi 3.5 Yes
Operating System vmware esxi 4.0 Yes
Operating System vmware esxi 4.1 Yes
Operating System vmware esxi 5.0 Yes

References