Lucene search

K
prionPRIOn knowledge basePRION:CVE-2010-3859
HistoryDec 29, 2010 - 6:00 p.m.

Design/Logic Flaw

2010-12-2918:00:00
PRIOn knowledge base
www.prio-n.com
9

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%

Multiple integer signedness errors in the TIPC implementation in the Linux kernel before 2.6.36.2 allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c.

CPENameOperatorVersion
debian_linuxeq5.0
linux_kernellt2.6.36.2

References

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%