Linux Kernel Sendmsg() Local Buffer Overflow Vulnerability

Linux kernel is prone to a local buffer-overflow vulnerability.

The vulnerability affects 'sendmsg()' when malformed user-supplied data is copied from userland to kernel memory.

A successful attack can allow a local attacker to trigger an overflow, which may lead to a denial-of-service condition due to memory corruption. Arbitrary code execution resulting in privilege escalation is possible as well.


 

Privacy Statement
Copyright 2010, SecurityFocus