CVE-2010-3876

LOW

Description

net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=67286640f638f5ad41a946b9a3dc75327950248f

http://marc.info/?l=linux-netdev&m=128854507220908&w=2

http://openwall.com/lists/oss-security/2010/11/02/10

http://openwall.com/lists/oss-security/2010/11/02/12

http://openwall.com/lists/oss-security/2010/11/02/7

http://openwall.com/lists/oss-security/2010/11/02/9

http://openwall.com/lists/oss-security/2010/11/04/5

http://secunia.com/advisories/42789

http://secunia.com/advisories/42890

http://secunia.com/advisories/42963

http://secunia.com/advisories/46397

http://www.debian.org/security/2010/dsa-2126

http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2

http://www.redhat.com/support/errata/RHSA-2010-0958.html

http://www.redhat.com/support/errata/RHSA-2011-0004.html

http://www.redhat.com/support/errata/RHSA-2011-0007.html

http://www.redhat.com/support/errata/RHSA-2011-0162.html

http://www.securityfocus.com/archive/1/520102/100/0/threaded

http://www.securityfocus.com/bid/44630

http://www.vmware.com/security/advisories/VMSA-2011-0012.html

http://www.vupen.com/english/advisories/2011/0024

http://www.vupen.com/english/advisories/2011/0168

https://bugzilla.redhat.com/show_bug.cgi?id=649715

Details

Source: MITRE

Published: 2011-01-03

Updated: 2018-10-10

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 1.9

Vector: (AV:L/AC:M/Au:N/C:P/I:N/A:N)

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW