CVE-2010-3081
HIGH EXPLOITED IN THE WILDLinux kernel <2.6.36-rc4-git2 - Privilege Escalation
Title source: llmDescription
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Ac1dB1tCh3z · clocallinux_x86-64
https://www.exploit-db.com/exploits/15024
References (28)
... and 8 more
Scores
CVSS v3
7.8
EPSS
0.0725
EPSS Percentile
91.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2010-09-15
InTheWild.io
2020-08-11
CWE
CWE-119
Status
published
Products (6)
linux/linux_kernel
2.6.36 (4 CPE variants)
linux/linux_kernel
< 2.6.35.4
suse/suse_linux_enterprise_desktop
11 sp1
suse/suse_linux_enterprise_server
11 sp1
vmware/esx
4.0
vmware/esx
4.1
Published
Sep 24, 2010
Tracked Since
Feb 18, 2026