[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-2955

Date: (C)2010-09-08   (M)2017-11-18 


The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.

CVSS Score: 3.3Access Vector: ADJACENT_NETWORK
Exploit Score: 6.5Access Complexity: LOW
Impact Score: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE





Reference:
SECUNIA-41245
BID-42885
ADV-2011-0298
RHSA-2010:0771
RHSA-2010:0842
SUSE-SA:2010:052
SUSE-SA:2010:054
SUSE-SA:2011:007
USN-1000-1
http://lkml.org/lkml/2010/8/27/413
http://lkml.org/lkml/2010/8/30/351
http://lkml.org/lkml/2010/8/30/127
http://lkml.org/lkml/2010/8/30/146
http://www.openwall.com/lists/oss-security/2010/08/31/1
http://forums.grsecurity.net/viewtopic.php?f=3&t=2290
http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git;a=commit;h=42da2f948d949efd0111309f5827bf0298bcc9a4
http://grsecurity.net/~spender/wireless-infoleak-fix2.patch
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=628434

CPE    425
cpe:/o:linux:linux_kernel:2.6.33:rc7
cpe:/o:linux:linux_kernel:2.6.33:rc4
cpe:/o:linux:linux_kernel:2.6.33:rc3
cpe:/o:linux:linux_kernel:2.6.33:rc6
...
CWE    1
CWE-189
OVAL    16
oval:org.secpod.oval:def:500395
oval:org.secpod.oval:def:400039
oval:org.secpod.oval:def:100642
oval:org.secpod.oval:def:101044
...

© 2013 SecPod Technologies