Vulnerability CVE-2010-4077


Published: 2010-11-29   Modified: 2012-02-13

Description:
The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Linux <= 2.6.37-rc1 serial_core TIOCGICOUNT Leak Exploit
prdelka
15.03.2011

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.9/10
2.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Linux -> Kernel 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=648663
http://www.openwall.com/lists/oss-security/2010/10/25/3
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862
http://www.securityfocus.com/bid/45059
http://www.redhat.com/support/errata/RHSA-2011-0007.html
http://www.redhat.com/support/errata/RHSA-2010-0958.html
http://www.openwall.com/lists/oss-security/2010/10/06/6
http://securityreason.com/securityalert/8129
http://secunia.com/advisories/42890
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html

Copyright 2022, cxsecurity.com

 

Back to Top