CVE-2010-3904

HIGH KEV

Reliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation

Title source: metasploit

Description

The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44677
exploitdb WORKING POC VERIFIED
by Dan Rosenberg · clocallinux
https://www.exploit-db.com/exploits/15285
nomisec WORKING POC
by redhatkaty · local
https://github.com/redhatkaty/-cve-2010-3904-report
metasploit WORKING POC GREAT
by Dan Rosenberg, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/rds_rds_page_copy_user_priv_esc.rb

References (20)

Scores

CVSS v3 7.8
EPSS 0.0145
EPSS Percentile 80.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-05-12
VulnCheck KEV 2023-05-12
InTheWild.io 2023-05-12
ENISA EUVD EUVD-2010-3882
CWE
CWE-1284
Status published
Products (18)
canonical/ubuntu_linux 6.06
canonical/ubuntu_linux 8.04
canonical/ubuntu_linux 9.04
canonical/ubuntu_linux 9.10
canonical/ubuntu_linux 10.04
canonical/ubuntu_linux 10.10
linux/linux_kernel < 2.6.36
opensuse/opensuse 11.2
opensuse/opensuse 11.3
redhat/enterprise_linux 5.0
... and 8 more
Published Dec 06, 2010
KEV Added May 12, 2023
Tracked Since Feb 18, 2026