Zero-day vulnerability in Linux kernel

Privilege escalation
CVE-2010-3081

Based on the sophisticated and fully functional exploits this vulnerability was exploited in the wild for quite some time before the patch was issued.

Known malware:

Linux/Exploit.CVE-2010-3081.B

Vulnerability details

Advisory: SB2010090801 - Privilege escalation in Linux kernel

Vulnerable component: Linux kernel

CVE-ID: CVE-2010-3081

CVSSv3 score: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Description:

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to improper allocation of userspace memory required for the 32-bit compatibility layer within compat_alloc_user_space() function in include/asm/compat.h file on on 64-bit platforms. A local user can call compat_mc_getsockopt() function and gain control over vulnerable system.

Successful exploitation of the vulnerability allows a local non-privileged user to gain root privileges.

Public Exploits: