V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2010-2803
DEB
LowConfirmedExploit available

The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2…

CVSS
1.9
Low
EPSS
0.00
p19
Published
2010-01-01
Updated
2010-01-01
Description

The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.

Tags · CWE
Information disclosure
CWE-200
CAPEC-13
CAPEC-22
CAPEC-59
CAPEC-60
CAPEC-79
CAPEC-116
CAPEC-169
CAPEC-224
CAPEC-285
CAPEC-287
CAPEC-290
CAPEC-291
CAPEC-292
CAPEC-293
CAPEC-294
CAPEC-295
CAPEC-296
CAPEC-297
CAPEC-298
CAPEC-299
CAPEC-300
CAPEC-301
CAPEC-302
CAPEC-303
CAPEC-304
CAPEC-305
CAPEC-306
CAPEC-307
CAPEC-308
CAPEC-309
CAPEC-310
CAPEC-312
CAPEC-313
CAPEC-317
CAPEC-318
CAPEC-319
CAPEC-320
CAPEC-321
CAPEC-322
CAPEC-323
CAPEC-324
CAPEC-325
CAPEC-326
CAPEC-327
CAPEC-328
CAPEC-329
CAPEC-330
CAPEC-472
CAPEC-497
CAPEC-508
CAPEC-573
CAPEC-574
CAPEC-575
CAPEC-576
CAPEC-577
CAPEC-616
CAPEC-643
CAPEC-646
CAPEC-651
Affected products
Debian_linux
CVSS vector
AV:L/AC:M/Au:N/C:P/I:N/A:N
Timeline
2010-01-01
Published
2010-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: M
Medium
Authentication
Au: N
None (N)
Confidentiality Impact
C: P
Partial
Integrity Impact
I: N
None (N)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.001 · p19
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-574 · CWE-200
└ via CAPEC-292 · CWE-200
└ via CAPEC-577 · CWE-200
└ via CAPEC-300 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-573 · CWE-200
└ via CAPEC-576 · CWE-200
└ via CAPEC-312 · CWE-200
└ via CAPEC-497 · CWE-200
└ via CAPEC-575 · CWE-200
└ via CAPEC-646 · CWE-200
└ via CAPEC-295 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-643 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-13 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-576 · CWE-200
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
linuxTracked
linux-2.6Tracked
debian_linux*Tracked
linux_enterprise_desktop*Tracked
linux_enterprise_high_availability_extension*Tracked
linux_enterprise_real_time*Tracked
linux_enterprise_server*Tracked
linux_kernel*Tracked
opensuse*Tracked
Source databases
DEB
CVE
RED
UBU
Related vulnerabilities