Vulnerability Name: CVE-2010-3865 (CCN-62881) Assigned: 2010-10-29 Published: 2010-10-29 Updated: 2023-02-13 Summary: Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow. CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.8 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.2 High (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.8 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-119 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2010-3865 Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: CCN Type: RHSA-2011-0004Important: kernel security, bug fix, and enhancement update Source: CCN Type: RHSA-2011-0007Important: kernel security and bug fix update Source: CCN Type: SA46397VMware ESX / ESXi Server Multiple Vulnerabilities Source: CCN Type: The Linux Kernel Archives Web siteThe Linux Kernel Archives Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: CCN Type: OSVDB ID: 70375Linux Kernel net/rds/rdma.c rds_rdma_pages Function RDS Request iovec Struct Local Overflow DoS Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entrysecalert@redhat.com Source: CCN Type: BID-44549Linux Kernel Reliable Datagram Sockets (RDS) Protocol Local Integer Overflow Vulnerability Source: secalert@redhat.com Type: Third Party Advisory, VDB Entrysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Patch, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 647416kernel: iovec integer overflow in net/rds/rdma.c Source: secalert@redhat.com Type: Third Party Advisory, VDB Entrysecalert@redhat.com Source: XF Type: UNKNOWNkernel-rdsrdmapages-overflow(62881) Source: SUSE Type: SUSE-SA:2010:057Linux kernel security problems Source: SUSE Type: SUSE-SA:2011:001Linux kernel security update Source: SUSE Type: SUSE-SA:2011:002Linux kernel security update Source: SUSE Type: SUSE-SA:2011:007Linux realtime kernel security update Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32:git-6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
linux linux kernel 2.6.30.4
linux linux kernel 2.6.30.5
linux linux kernel 2.6.31 rc1
linux linux kernel 2.6.30.3
linux linux kernel 2.6.31 rc2
linux linux kernel 2.6.31 rc3
linux linux kernel 2.6.31 rc4
linux linux kernel 2.6.31 rc5
linux linux kernel 2.6.31 rc6
linux linux kernel 2.6.31 rc7
linux linux kernel 2.6.31 rc8
linux linux kernel 2.6.31 rc9
linux linux kernel 2.6.31
linux linux kernel 2.6.30.6
linux linux kernel 2.6.30.7
linux linux kernel 2.6.30.8
linux linux kernel 2.6.30.9
linux linux kernel 2.6.31.1
linux linux kernel 2.6.31.2
linux linux kernel 2.6.31.3
linux linux kernel 2.6.31.4
linux linux kernel 2.6.32 rc4
linux linux kernel 2.6.32 rc1
linux linux kernel 2.6.32 rc3
linux linux kernel 2.6.31.5
linux linux kernel 2.6.31.6
linux linux kernel 2.6.32 rc6
linux linux kernel 2.6.32 rc5
linux linux kernel 2.6.32
linux linux kernel 2.6.32 rc7
linux linux kernel 2.6.32 rc8
linux linux kernel 2.6.32 git-6
linux linux kernel 2.6.32.1
linux linux kernel 2.6.32.2
linux linux kernel 2.6.32.3
linux linux kernel 2.6.33
linux linux kernel 2.6.32.4
linux linux kernel 2.6.33 rc1
linux linux kernel 2.6.33 rc2
linux linux kernel 2.6.33 rc3
linux linux kernel 2.6.33 rc4
linux linux kernel 2.6.33 rc5
linux linux kernel 2.6.33 rc6
linux linux kernel 2.6.32.7
linux linux kernel 2.6.33 rc7
linux linux kernel 2.6.32.5
linux linux kernel 2.6.32.6
linux linux kernel 2.6.33.1
linux linux kernel 2.6.32.8
linux linux kernel 2.6.32.9
linux linux kernel 2.6.32.10
linux linux kernel 2.6.31.7
linux linux kernel 2.6.31.8
linux linux kernel 2.6.31.9
linux linux kernel 2.6.31.10
linux linux kernel 2.6.31.11
linux linux kernel 2.6.31.12
linux linux kernel 2.6.34 rc1
linux linux kernel 2.6.33 rc8
linux linux kernel 2.6.31.13
linux linux kernel 2.6.32.11
linux linux kernel 2.6.33.2
linux linux kernel 2.6.34 rc2
linux linux kernel 2.6.34 rc3
linux linux kernel 2.6.34 rc4
linux linux kernel 2.6.34
linux linux kernel 2.6.34 rc5
linux linux kernel 2.6.32.12
linux linux kernel 2.6.32.13
linux linux kernel 2.6.33.3
linux linux kernel 2.6.33.4
linux linux kernel 2.6.33.5
linux linux kernel 2.6.35 rc1
linux linux kernel 2.6.35 rc2
linux linux kernel 2.6.35 rc3
linux linux kernel 2.6.35 rc4
linux linux kernel 2.6.35 rc5
redhat enterprise linux 5
redhat enterprise linux 5
redhat enterprise linux 6
redhat enterprise linux 6
redhat enterprise linux desktop 6
redhat enterprise linux hpc node 6