Zero-day vulnerability in Linux kernel

Privilege escalation

Based on the sophisticated and fully functional exploits this vulnerability was exploited in the wild for quite some time before the patch was issued.

Known malware:


Vulnerability details

Advisory: SB2010090801 - Privilege escalation in Linux kernel

Vulnerable component: Linux kernel

CVE-ID: CVE-2010-3081

CVSSv3 score: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls


The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to improper allocation of userspace memory required for the 32-bit compatibility layer within compat_alloc_user_space() function in include/asm/compat.h file on on 64-bit platforms. A local user can call compat_mc_getsockopt() function and gain control over vulnerable system.

Successful exploitation of the vulnerability allows a local non-privileged user to gain root privileges.

Public Exploits: