Vulnerability Name: | CVE-2010-4661 (CCN-67197) | ||||||||||||||||||||
Assigned: | 2011-03-15 | ||||||||||||||||||||
Published: | 2011-03-15 | ||||||||||||||||||||
Updated: | 2019-11-18 | ||||||||||||||||||||
Summary: | udisks before 1.0.3 allows a local user to load arbitrary Linux kernel modules. | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P) 3.4 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-434 | ||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||
References: | Source: CCN Type: udisks GIT Repository cgit logo freedesktop.org git repository browser Source: MITRE Type: CNA CVE-2010-4661 Source: MISC Type: Mailing List, Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html Source: CCN Type: SA44364 udisks Kernel Module Loading Weakness Source: CCN Type: OSVDB ID: 73748 udisks mount(8) Command Arbitrary Kernel Module Loading Source: CCN Type: BID-47680 UDisks Kernel 'mount' Module Loading Security Vulnerability Source: MISC Type: Third Party Advisory https://access.redhat.com/security/cve/cve-2010-4661 Source: CCN Type: FreeDesktop Bugzilla Bug 32232 CVE-2010-4661: Arbitrary kernel module load Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4661 Source: XF Type: UNKNOWN udisks-mount-security-bypass(67197) Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2010-4661 Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |