CVE-2010-3081

HIGH EXPLOITED IN THE WILD

Linux kernel <2.6.36-rc4-git2 - Privilege Escalation

Title source: llm

Description

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Ac1dB1tCh3z · clocallinux_x86-64
https://www.exploit-db.com/exploits/15024

References (28)

... and 8 more

Scores

CVSS v3 7.8
EPSS 0.0725
EPSS Percentile 91.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2010-09-15
InTheWild.io 2020-08-11
CWE
CWE-119
Status published
Products (6)
linux/linux_kernel 2.6.36 (4 CPE variants)
linux/linux_kernel < 2.6.35.4
suse/suse_linux_enterprise_desktop 11 sp1
suse/suse_linux_enterprise_server 11 sp1
vmware/esx 4.0
vmware/esx 4.1
Published Sep 24, 2010
Tracked Since Feb 18, 2026