Lucene search

K
cve[email protected]CVE-2010-0830
HistoryJun 01, 2010 - 8:30 p.m.

CVE-2010-0830

2010-06-0120:30:02
CWE-189
web.nvd.nist.gov
53
cve-2010-0830
elf_get_dynamic_info
ld.so
glibc
libc6
remote code execution
nvd

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

8.4 High

AI Score

Confidence

High

0.094 Low

EPSS

Percentile

94.8%

Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.

Affected configurations

NVD
Node
gnuglibcMatch2.0.1
OR
gnuglibcMatch2.0.2
OR
gnuglibcMatch2.0.3
OR
gnuglibcMatch2.0.4
OR
gnuglibcMatch2.0.5
OR
gnuglibcMatch2.0.6
OR
gnuglibcMatch2.1
OR
gnuglibcMatch2.1.1
OR
gnuglibcMatch2.1.1.6
OR
gnuglibcMatch2.1.2
OR
gnuglibcMatch2.1.3
OR
gnuglibcMatch2.1.9
OR
gnuglibcMatch2.2
OR
gnuglibcMatch2.2.1
OR
gnuglibcMatch2.2.2
OR
gnuglibcMatch2.2.3
OR
gnuglibcMatch2.2.4
OR
gnuglibcMatch2.2.5
OR
gnuglibcMatch2.3
OR
gnuglibcMatch2.3.1
OR
gnuglibcMatch2.3.2
OR
gnuglibcMatch2.3.3
OR
gnuglibcMatch2.3.4
OR
gnuglibcMatch2.3.5
OR
gnuglibcMatch2.3.6
OR
gnuglibcMatch2.3.10
OR
gnuglibcMatch2.4
OR
gnuglibcMatch2.5
OR
gnuglibcMatch2.5.1
OR
gnuglibcMatch2.6
OR
gnuglibcMatch2.6.1
OR
gnuglibcMatch2.7
OR
gnuglibcMatch2.8
OR
gnuglibcMatch2.9
OR
gnuglibcMatch2.10
OR
gnuglibcMatch2.10.1
OR
gnuglibcMatch2.11
OR
gnuglibcMatch2.11.1

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

8.4 High

AI Score

Confidence

High

0.094 Low

EPSS

Percentile

94.8%