First published: Thu Nov 04 2010(Updated: )
Description of problem: Due to bad parsing of malformed X.25 facilities, a remote attacker can cause a kernel panic due to heap corruption (assuming both parties are communicating using X.25). Reference: <a href="http://www.spinics.net/lists/netdev/msg145786.html">http://www.spinics.net/lists/netdev/msg145786.html</a> <a href="http://www.spinics.net/lists/netdev/msg145873.html">http://www.spinics.net/lists/netdev/msg145873.html</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.36.2 | |
SUSE Linux | =11.4 | |
SUSE Linux Enterprise Server | =9 | |
Debian | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3873 is classified as a high severity vulnerability due to the potential for remote kernel panic.
CVE-2010-3873 can lead to heap corruption and cause a kernel panic when malformed X.25 facilities are processed.
CVE-2010-3873 affects multiple versions of the Linux kernel and specific distributions including Debian, openSUSE, and SUSE Linux Enterprise Server.
To remediate CVE-2010-3873, you should upgrade to a patched version of the Linux kernel as provided by your distribution.
Yes, CVE-2010-3873 can be exploited remotely by an attacker communicating over X.25.