V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2010-3078
DEB
MediumConfirmedExploit available

The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structu…

CVSS
5.5
Medium
EPSS
0.00
p22
Published
2010-01-01
Updated
2010-01-01
Description

The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.

Tags · CWE
Information disclosure
CWE-200
CWE-401
CAPEC-13
CAPEC-22
CAPEC-59
CAPEC-60
CAPEC-79
CAPEC-116
CAPEC-169
CAPEC-224
CAPEC-285
CAPEC-287
CAPEC-290
CAPEC-291
CAPEC-292
CAPEC-293
CAPEC-294
CAPEC-295
CAPEC-296
CAPEC-297
CAPEC-298
CAPEC-299
CAPEC-300
CAPEC-301
CAPEC-302
CAPEC-303
CAPEC-304
CAPEC-305
CAPEC-306
CAPEC-307
CAPEC-308
CAPEC-309
CAPEC-310
CAPEC-312
CAPEC-313
CAPEC-317
CAPEC-318
CAPEC-319
CAPEC-320
CAPEC-321
CAPEC-322
CAPEC-323
CAPEC-324
CAPEC-325
CAPEC-326
CAPEC-327
CAPEC-328
CAPEC-329
CAPEC-330
CAPEC-472
CAPEC-497
CAPEC-508
CAPEC-573
CAPEC-574
CAPEC-575
CAPEC-576
CAPEC-577
CAPEC-616
CAPEC-643
CAPEC-646
CAPEC-651
Affected products
Esx
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Timeline
2010-01-01
Published
2010-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: N
None (N)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.001 · p22
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-574 · CWE-200
└ via CAPEC-292 · CWE-200
└ via CAPEC-577 · CWE-200
└ via CAPEC-300 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-573 · CWE-200
└ via CAPEC-576 · CWE-200
└ via CAPEC-312 · CWE-200
└ via CAPEC-497 · CWE-200
└ via CAPEC-575 · CWE-200
└ via CAPEC-646 · CWE-200
└ via CAPEC-295 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-643 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-13 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-576 · CWE-200
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
kernelTracked
linuxTracked
linux-2.6Tracked
esx*Tracked
linux_kernel*Tracked
opensuse*Tracked
suse_linux_enterprise_desktop*Tracked
suse_linux_enterprise_server*Tracked
ubuntu_linux*Tracked
Source databases
DEB
CVE
RED
UBU