Vulnerability Name: | CVE-2010-1187 (CCN-57986) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2010-02-19 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2010-02-19 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-08-13 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C) 3.7 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
4.5 Medium (REDHAT Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2010-1187 Source: CONFIRM Type: Broken Link, Patch http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commitdiff;h=d0021b252eaf65ca07ed14f0d66425dd9ccab9a6;hp=6d55cb91a0020ac0d78edcad61efd6c8cf5785a3 Source: CCN Type: RHSA-2010-0504 Important: kernel security and bug fix update Source: SECUNIA Type: Third Party Advisory 39830 Source: CCN Type: SA43315 VMware ESX Server Multiple Kernel Vulnerabilities Source: SECUNIA Type: Third Party Advisory 43315 Source: DEBIAN Type: Third Party Advisory DSA-2053 Source: DEBIAN Type: DSA-2053 linux-2.6 -- privilege escalation/denial of service/information leak Source: CCN Type: The Linux Kernel Archives Web site The Linux Kernel Archives Source: MANDRIVA Type: Third Party Advisory MDVSA-2010:198 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20100330 CVE request: kernel: tipc: Fix oops on send prior to entering networked mode Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20100331 Re: CVE request: kernel: tipc: Fix oops on send prior to entering networked mode Source: CCN Type: OSVDB ID: 63452 Linux Kernel Transparent Inter-Process Communication (TIPC) AF_TIPC Datagram Local DoS Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX Source: BID Type: Third Party Advisory, VDB Entry 39120 Source: CCN Type: BID-39120 Linux Kernel 'tipc' Module Local Denial of Service Vulnerability Source: CONFIRM Type: Third Party Advisory http://www.vmware.com/security/advisories/VMSA-2011-0003.html Source: CCN Type: Red Hat Bugzilla Bug 578057 CVE-2010-1187 kernel: tipc: Fix oops on send prior to entering networked mode Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=578057 Source: XF Type: UNKNOWN kernel-tipc-dos(57986) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:9832 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |