CVE-2010-1187
Published Mar 31, 2010
Last updated a year ago
Overview
- Description
- The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-476
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A6A2AD9-18DC-45D5-A6D4-487475E9DB43", "versionEndIncluding": "2.6.33", "versionStartExcluding": "2.6.16" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBF2513D-8F4F-4ED5-ADCE-9933F34F1BFB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0CD4E4B-E756-4401-A352-871EBA5B8680" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "vulnerable": true, "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" } ], "operator": "OR" } ] } ]