V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2010-4158
DEB
MediumConfirmedExploit available

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has be…

CVSS
4.9
Medium
EPSS
0.00
p40
Published
2010-01-01
Updated
2010-01-01
Description

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

Tags · CWE
Information disclosure
CWE-200
CAPEC-13
CAPEC-22
CAPEC-59
CAPEC-60
CAPEC-79
CAPEC-116
CAPEC-169
CAPEC-224
CAPEC-285
CAPEC-287
CAPEC-290
CAPEC-291
CAPEC-292
CAPEC-293
CAPEC-294
CAPEC-295
CAPEC-296
CAPEC-297
CAPEC-298
CAPEC-299
CAPEC-300
CAPEC-301
CAPEC-302
CAPEC-303
CAPEC-304
CAPEC-305
CAPEC-306
CAPEC-307
CAPEC-308
CAPEC-309
CAPEC-310
CAPEC-312
CAPEC-313
CAPEC-317
CAPEC-318
CAPEC-319
CAPEC-320
CAPEC-321
CAPEC-322
CAPEC-323
CAPEC-324
CAPEC-325
CAPEC-326
CAPEC-327
CAPEC-328
CAPEC-329
CAPEC-330
CAPEC-472
CAPEC-497
CAPEC-508
CAPEC-573
CAPEC-574
CAPEC-575
CAPEC-576
CAPEC-577
CAPEC-616
CAPEC-643
CAPEC-646
CAPEC-651
Affected products
Fedora
CVSS vector
AV:L/AC:L/Au:N/C:N/I:N/A:C
Timeline
2010-01-01
Published
2010-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Authentication
Au: N
None (N)
Confidentiality Impact
C: N
None (N)
Integrity Impact
I: N
None (N)
Availability Impact
A: C
Complete
Exploit indicators
EPSS
0.002 · p40
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-574 · CWE-200
└ via CAPEC-292 · CWE-200
└ via CAPEC-577 · CWE-200
└ via CAPEC-300 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-573 · CWE-200
└ via CAPEC-576 · CWE-200
└ via CAPEC-312 · CWE-200
└ via CAPEC-497 · CWE-200
└ via CAPEC-575 · CWE-200
└ via CAPEC-646 · CWE-200
└ via CAPEC-295 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-643 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-13 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-576 · CWE-200
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
kernelTracked
kernelTracked
kernel-rtTracked
linuxTracked
linux-2.6Tracked
fedora*Tracked
linux_enterprise_desktop*Tracked
linux_enterprise_real_time_extension*Tracked
linux_enterprise_server*Tracked
linux_enterprise_software_development_kit*Tracked
linux_kernel*Tracked
opensuse*Tracked