Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2010-4083

CVE information

Published

13 years ago

Last Modified

5 months ago

CVSSv2.0 Severity

Low

Impact Analysis

Description

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call..

CVSSv2.0 Score

Severity
Low
Base Score
1.9/10
Exploit Score
3.4/10
Access Vector
Local
Access Complexity
Medium
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
Partial
Availability Impact
None
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  Yes
- 2.6.36
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  Yes
- -

References