CVE-2010-3904
high-risk
Published 2010-12-06
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
Do I need to act?
~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (18)
References (39)
Broken Link
http://secunia.com/advisories/46397
Broken Link
http://securitytracker.com/id?1024613
Third Party Advisory
http://www.kb.cert.org/vuls/id/362983
Third Party Advisory
http://www.ubuntu.com/usn/USN-1000-1
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=642896
and 19 more references
61
/ 100
high-risk
Severity
24/34 · High
Exploitability
18/34 · Moderate
Exposure
19/34 · Moderate