CVE-2010-1451

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.

References

http://marc.info/?l=linux-sparc&m=126662159602378&w=2

http://marc.info/?l=linux-sparc&m=126662196902830&w=2

http://secunia.com/advisories/39830

http://www.debian.org/security/2010/dsa-2053

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33

http://www.openwall.com/lists/oss-security/2010/02/24/1

http://www.openwall.com/lists/oss-security/2010/05/05/2

Details

Source: MITRE

Published: 2010-05-07

Updated: 2020-08-14

Type: CWE-787

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Tenable Plugins

View all (2 total)

IDNameProductFamilySeverity
48253Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : linux, linux-{source-2.6.15,ec2,mvl-dove,ti-omap} vulnerabilities (USN-966-1)NessusUbuntu Local Security Checks
high
46725Debian DSA-2053-1 : linux-2.6 - privilege escalation/denial of service/information leakNessusDebian Local Security Checks
high