CVE Reference: CVE-2010-4243

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2010-4243

Description:
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/64700

SAID
  Secunia Advisory: SA42884
  Secunia Advisory: SA46397

REDHAT
  http://www.redhat.com/support/errata/RHSA-2011-0017.html

MLIST
  http://openwall.com/lists/oss-security/2010/11/22/6
  http://openwall.com/lists/oss-security/2010/11/22/15
  http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html
  http://lkml.org/lkml/2010/8/30/378
  http://lkml.org/lkml/2010/8/30/138
  http://lkml.org/lkml/2010/8/29/206
  http://lkml.org/lkml/2010/8/27/429

MISC
  http://grsecurity.net/~spender/64bit_dos.c

EXPLOIT-DB
  http://www.exploit-db.com/exploits/15619

CONFIRM
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c
  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
  http://www.vmware.com/security/advisories/VMSA-2011-0012.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded

BID
  45004


Return to the previous page.