Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2010-2959 First vendor Publication 2010-09-08
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2959

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12803
 
Oval ID: oval:org.mitre.oval:def:12803
Title: USN-974-2 -- linux regression
Description: USN-974-1 fixed vulnerabilities in the Linux kernel. The fixes for CVE-2010-2240 caused failures for Xen hosts. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory manager did not properly handle when applications grow stacks into adjacent memory regions. A local attacker could exploit this to gain control of certain applications, potentially leading to privilege escalation, as demonstrated in attacks against the X server. Kees Cook discovered that under certain situations the ioctl subsystem for DRM did not properly sanitize its arguments. A local attacker could exploit this to read previously freed kernel memory, leading to a loss of privacy. Ben Hawkes discovered an integer overflow in the Controller Area Network subsystem when setting up frame content and filtering certain messages. An attacker could send specially crafted CAN traffic to crash the system or gain root privileges
Family: unix Class: patch
Reference(s): USN-974-2
CVE-2010-2240
CVE-2010-2803
CVE-2010-2959
Version: 5
Platform(s): Ubuntu 8.04
Product(s): linux
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1
Os 1
Os 1327
Os 1
Os 1
Os 1
Os 1
Os 1

ExploitDB Exploits

id Description
2010-08-27 Linux Kernel < 2.6.36-rc1 CAN BCM Privilege Escalation Exploit

OpenVAS Exploits

Date Description
2011-01-11 Name : SuSE Update for kernel SUSE-SA:2010:047
File : nvt/gb_suse_2010_047.nasl
2010-10-19 Name : Mandriva Update for kernel MDVSA-2010:198 (kernel)
File : nvt/gb_mandriva_MDVSA_2010_198.nasl
2010-10-10 Name : Debian Security Advisory DSA 2094-1 (linux-2.6)
File : nvt/deb_2094_1.nasl
2010-10-01 Name : SuSE Update for kernel SUSE-SA:2010:043
File : nvt/gb_suse_2010_043.nasl
2010-10-01 Name : SuSE Update for kernel SUSE-SA:2010:046
File : nvt/gb_suse_2010_046.nasl
2010-09-27 Name : Mandriva Update for kernel MDVSA-2010:188 (kernel)
File : nvt/gb_mandriva_MDVSA_2010_188.nasl
2010-09-07 Name : Fedora Update for kernel FEDORA-2010-13903
File : nvt/gb_fedora_2010_13903_kernel_fc12.nasl
2010-08-30 Name : Ubuntu Update for linux regression USN-974-2
File : nvt/gb_ubuntu_USN_974_2.nasl
2010-08-20 Name : Ubuntu Update for Linux kernel vulnerabilities USN-974-1
File : nvt/gb_ubuntu_USN_974_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
67335 Linux Kernel Controller Area Network net/can/bcm.c Broadcast Manager Implemen...

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_kernel-100915.nasl - Type : ACT_GATHER_INFO
2011-01-21 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_kernel-100903.nasl - Type : ACT_GATHER_INFO
2011-01-21 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_kernel-100921.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_kernel-100920.nasl - Type : ACT_GATHER_INFO
2010-10-08 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-198.nasl - Type : ACT_GATHER_INFO
2010-09-24 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-188.nasl - Type : ACT_GATHER_INFO
2010-09-24 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_kernel-100921.nasl - Type : ACT_GATHER_INFO
2010-09-24 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_kernel-100921.nasl - Type : ACT_GATHER_INFO
2010-09-03 Name : The remote Fedora host is missing a security update.
File : fedora_2010-13903.nasl - Type : ACT_GATHER_INFO
2010-08-27 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-974-2.nasl - Type : ACT_GATHER_INFO
2010-08-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2094.nasl - Type : ACT_GATHER_INFO
2010-08-20 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-974-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3...
Source Url
BID http://www.securityfocus.com/bid/42585
CONFIRM http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4
https://bugzilla.redhat.com/show_bug.cgi?id=625699
DEBIAN http://www.debian.org/security/2010/dsa-2094
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-September/0469...
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
MISC http://jon.oberheide.org/files/i-can-haz-modharden.c
MLIST http://www.openwall.com/lists/oss-security/2010/08/20/2
SECUNIA http://secunia.com/advisories/41512
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
VUPEN http://www.vupen.com/english/advisories/2010/2430
http://www.vupen.com/english/advisories/2011/0298

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
Date Informations
2024-02-02 01:13:46
  • Multiple Updates
2024-02-01 12:03:46
  • Multiple Updates
2023-11-07 21:47:34
  • Multiple Updates
2023-09-05 12:12:49
  • Multiple Updates
2023-09-05 01:03:37
  • Multiple Updates
2023-09-02 12:12:53
  • Multiple Updates
2023-09-02 01:03:40
  • Multiple Updates
2023-08-12 12:15:20
  • Multiple Updates
2023-08-12 01:03:39
  • Multiple Updates
2023-08-11 12:12:55
  • Multiple Updates
2023-08-11 01:03:47
  • Multiple Updates
2023-08-06 12:12:26
  • Multiple Updates
2023-08-06 01:03:41
  • Multiple Updates
2023-08-04 12:12:32
  • Multiple Updates
2023-08-04 01:03:42
  • Multiple Updates
2023-07-14 12:12:28
  • Multiple Updates
2023-07-14 01:03:40
  • Multiple Updates
2023-03-29 01:14:16
  • Multiple Updates
2023-03-28 12:03:47
  • Multiple Updates
2022-10-11 12:11:07
  • Multiple Updates
2022-10-11 01:03:28
  • Multiple Updates
2022-03-11 01:09:16
  • Multiple Updates
2021-05-04 12:12:15
  • Multiple Updates
2021-04-22 01:12:57
  • Multiple Updates
2020-09-02 17:22:49
  • Multiple Updates
2020-08-08 01:05:21
  • Multiple Updates
2020-08-07 12:05:25
  • Multiple Updates
2020-08-01 12:05:23
  • Multiple Updates
2020-07-30 01:05:33
  • Multiple Updates
2020-05-23 01:42:27
  • Multiple Updates
2020-05-23 00:26:15
  • Multiple Updates
2019-01-25 12:03:16
  • Multiple Updates
2018-10-30 12:03:30
  • Multiple Updates
2016-07-01 11:06:55
  • Multiple Updates
2016-06-29 00:14:20
  • Multiple Updates
2016-06-28 18:17:14
  • Multiple Updates
2016-04-26 20:00:43
  • Multiple Updates
2014-06-14 13:29:05
  • Multiple Updates
2014-02-17 10:56:50
  • Multiple Updates
2013-05-10 23:30:17
  • Multiple Updates