Lucene search

K
cveRedhatCVE-2010-3301
HistorySep 22, 2010 - 7:00 p.m.

CVE-2010-3301

2010-09-2219:00:03
CWE-269
redhat
web.nvd.nist.gov
101
9
cve-2010-3301
linux kernel
privilege escalation
ia32
x86_64
cve-2007-4573 regression
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.5

Confidence

High

EPSS

0

Percentile

0.4%

The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.

Affected configurations

Nvd
Node
linuxlinux_kernelRange<2.6.36
OR
linuxlinux_kernelMatch2.6.36-
OR
linuxlinux_kernelMatch2.6.36rc1
OR
linuxlinux_kernelMatch2.6.36rc2
OR
linuxlinux_kernelMatch2.6.36rc3
Node
suselinux_enterprise_real_time_extensionMatch11sp1
Node
canonicalubuntu_linuxMatch9.10
OR
canonicalubuntu_linuxMatch10.04-
OR
canonicalubuntu_linuxMatch10.10
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel2.6.36cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
linuxlinux_kernel2.6.36cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
linuxlinux_kernel2.6.36cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
linuxlinux_kernel2.6.36cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
suselinux_enterprise_real_time_extension11cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
canonicalubuntu_linux9.10cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
canonicalubuntu_linux10.04cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
canonicalubuntu_linux10.10cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*

References

Social References

More

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.5

Confidence

High

EPSS

0

Percentile

0.4%