Vulnerability Details : CVE-2010-2495
The pppol2tp_xmit function in drivers/net/pppol2tp.c in the L2TP implementation in the Linux kernel before 2.6.34 does not properly validate certain values associated with an interface, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors related to a routing change.
Vulnerability category: Memory CorruptionDenial of service
Threat overview for CVE-2010-2495
Top countries where our scanners detected CVE-2010-2495
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2010-2495 2,975
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-2495!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-2495
Probability of exploitation activity in the next 30 days: 1.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2495
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-2495
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2495
-
http://www.openwall.com/lists/oss-security/2010/07/04/3
oss-security - Re: CVE Request: kernel: l2tp: Fix oops in pppol2tp_xmitMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-1000-1
USN-1000-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
404: File not foundRelease Notes;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2010/07/04/2
oss-security - Re: kernel: l2tp: Fix oops in pppol2tp_xmitMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=607054
607054 – (CVE-2010-2495) CVE-2010-2495 kernel: l2tp: Fix oops in pppol2tp_xmitIssue Tracking;Third Party Advisory;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2010/06/23/3
oss-security - kernel: l2tp: Fix oops in pppol2tp_xmitMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/07/06/11
oss-security - Re: kernel: l2tp: Fix oops in pppol2tp_xmitMailing List;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3feec9095d12e311b7d4eb7fe7e5dfa75d4a72a5
-
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20Mailing List;Third Party Advisory
Products affected by CVE-2010-2495
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*