V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2010-2942
DEB
MediumConfirmedExploit available

The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain…

CVSS
5.5
Medium
EPSS
0.00
p17
Published
2010-01-01
Updated
2010-01-01
Description

The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.

Tags · CWE
CWE-401
Affected products
Aura_communication_managerAura_presence_servicesAura_session_managerAura_system_managerAura_system_platformIqVoice_portal
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Timeline
2010-01-01
Published
2010-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: N
None (N)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.001 · p17
Known exploited (KEV)
No
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
kernelTracked
kernel-rtTracked
linuxTracked
linux-2.6Tracked
linux-2.6Tracked
aura_communication_manager*Tracked
aura_presence_services*Tracked
aura_session_manager*Tracked
aura_system_manager*Tracked
aura_system_platform*Tracked
esx*Tracked
iq*Tracked
linux_kernel*Tracked
opensuse*Tracked
suse_linux_enterprise_desktop*Tracked
suse_linux_enterprise_server*Tracked
ubuntu_linux*Tracked
voice_portal*Tracked
Source databases
DEB
CVE
RED
UBU