Vulnerability Details : CVE-2010-1187
The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-1187
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-1187
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2010-1187
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-1187
-
http://www.debian.org/security/2010/dsa-2053
Debian -- Security Information -- DSA-2053-1 linux-2.6Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9832
Repository / Oval RepositoryThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/03/30/1
oss-security - CVE request: kernel: tipc: Fix oops on send prior to entering networked modeMailing List;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commitdiff;h=d0021b252eaf65ca07ed14f0d66425dd9ccab9a6;hp=6d55cb91a0020ac0d78edcad61efd6c8cf5785a3
Broken Link;Patch
-
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VMSA-2011-0003.2Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=578057
578057 – (CVE-2010-1187) CVE-2010-1187 kernel: tipc: Fix oops on send prior to entering networked modeIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/03/31/1
oss-security - Re: CVE request: kernel: tipc: Fix oops on send prior to entering networked modeMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/39120
Linux Kernel 'tipc' Module Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
mandriva.comThird Party Advisory
-
http://www.securityfocus.com/archive/1/516397/100/0/threaded
SecurityFocusThird Party Advisory;VDB Entry
Products affected by CVE-2010-1187
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.16:rc7:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*