Overview
The RDS protocol implementation of Linux kernels 2.6.30 through 2.6.38-rc8 contain a local privilege escalation vulnerability.
Description
Kernel functions fail to properly check if a user supplied address exists in the user segment of memory. By providing a kernel address to a socket call an unprivileged user can execute arbitrary code as root. Additional details can be found in the VSR Security Advisory. |
Impact
An unprivileged local attacker can escalate their privileges to root. |
Solution
Apply an update for the specific Linux distribution used. |
If the RDS protocol is not needed, it can be disabled with the following command run as root. echo "alias net-pf-21 off" > /etc/modprobe.d/disable-rds |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Dan Rosenberg of Virtual Security Research for researching and publishing the details of this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2010-3904 |
Severity Metric: | 20.84 |
Date Public: | 2010-10-19 |
Date First Published: | 2010-10-25 |
Date Last Updated: | 2010-10-25 19:38 UTC |
Document Revision: | 13 |