CVE-2010-3873
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
03/01/2011
Last modified:
11/04/2025
Description
The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.36.2 (excluding) | |
| cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Da6331d6f9a4298173b413cf99a40cc86a9d92c37
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
- http://openwall.com/lists/oss-security/2010/11/03/2
- http://openwall.com/lists/oss-security/2010/11/04/3
- http://secunia.com/advisories/43291
- http://www.debian.org/security/2010/dsa-2126
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A029
- http://www.spinics.net/lists/netdev/msg145786.html
- http://www.spinics.net/lists/netdev/msg145873.html
- http://www.vupen.com/english/advisories/2011/0375
- https://bugzilla.redhat.com/show_bug.cgi?id=649693
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Da6331d6f9a4298173b413cf99a40cc86a9d92c37
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
- http://openwall.com/lists/oss-security/2010/11/03/2
- http://openwall.com/lists/oss-security/2010/11/04/3
- http://secunia.com/advisories/43291
- http://www.debian.org/security/2010/dsa-2126
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A029
- http://www.spinics.net/lists/netdev/msg145786.html
- http://www.spinics.net/lists/netdev/msg145873.html
- http://www.vupen.com/english/advisories/2011/0375
- https://bugzilla.redhat.com/show_bug.cgi?id=649693



