CVE-2010-0830 (GCVE-0-2010-0830)
Vulnerability from cvelistv5 – Published: 2010-06-01 20:00 – Updated: 2024-08-07 00:59
VLAI?
Summary
Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
14 references
Date Public ?
2010-04-22 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:59:39.371Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2010:111",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"
},
{
"name": "GLSA-201011-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201011-01.xml"
},
{
"name": "ADV-2010-1246",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/1246"
},
{
"name": "USN-944-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-944-1"
},
{
"name": "39900",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/39900"
},
{
"name": "SUSE-SA:2010:052",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"
},
{
"name": "40063",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/40063"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://frugalware.org/security/662"
},
{
"name": "MDVSA-2010:112",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112"
},
{
"name": "DSA-2058",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2058"
},
{
"name": "glibc-elf-code-execution(58915)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58915"
},
{
"name": "1024044",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1024044"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-04-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01.000Z",
"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"shortName": "canonical"
},
"references": [
{
"name": "MDVSA-2010:111",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"
},
{
"name": "GLSA-201011-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201011-01.xml"
},
{
"name": "ADV-2010-1246",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/1246"
},
{
"name": "USN-944-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-944-1"
},
{
"name": "39900",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/39900"
},
{
"name": "SUSE-SA:2010:052",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"
},
{
"name": "40063",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/40063"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://frugalware.org/security/662"
},
{
"name": "MDVSA-2010:112",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112"
},
{
"name": "DSA-2058",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2058"
},
{
"name": "glibc-elf-code-execution(58915)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58915"
},
{
"name": "1024044",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1024044"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2010-0830",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2010:111",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"
},
{
"name": "GLSA-201011-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201011-01.xml"
},
{
"name": "ADV-2010-1246",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1246"
},
{
"name": "USN-944-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-944-1"
},
{
"name": "39900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39900"
},
{
"name": "SUSE-SA:2010:052",
"refsource": "SUSE",
"url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"
},
{
"name": "40063",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40063"
},
{
"name": "http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html",
"refsource": "MISC",
"url": "http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html"
},
{
"name": "http://sourceware.org/git/?p=glibc.git;a=commit;h=db07e962b6ea963dbb345439f6ab9b0cf74d87c5",
"refsource": "CONFIRM",
"url": "http://sourceware.org/git/?p=glibc.git;a=commit;h=db07e962b6ea963dbb345439f6ab9b0cf74d87c5"
},
{
"name": "http://frugalware.org/security/662",
"refsource": "CONFIRM",
"url": "http://frugalware.org/security/662"
},
{
"name": "MDVSA-2010:112",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112"
},
{
"name": "DSA-2058",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2058"
},
{
"name": "glibc-elf-code-execution(58915)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58915"
},
{
"name": "1024044",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024044"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"assignerShortName": "canonical",
"cveId": "CVE-2010-0830",
"datePublished": "2010-06-01T20:00:00.000Z",
"dateReserved": "2010-03-03T00:00:00.000Z",
"dateUpdated": "2024-08-07T00:59:39.371Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2010-0830",
"date": "2026-05-20",
"epss": "0.06292",
"percentile": "0.91047"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEA795F7-8AAC-42BA-971B-601346704BD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CADA314-C0D0-40F8-9019-884F17D0B54A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"255E0C0D-0B70-4C10-BF7C-34193AA24C42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F424F2F5-D7E4-4A13-A8CF-32D466610BDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DC4E7AE-BDC4-48F1-9FDE-3F3FAA3F40F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1329215-C53A-40D5-8E9C-F457D092E483\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E2A0F12-FD00-40B9-86AD-7D082385E5DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8ED8F0E8-A969-4F7F-A100-662F4A5426FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9416576F-A605-45BE-AA01-FEF357A66979\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE582B8F-4E31-4D0F-B2F9-AC83C855F751\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB56D9C9-13B3-418C-B06C-0997E165F1C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19D5667D-5EA4-4B44-BF8A-9C10506BD4E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21F23D2F-A01F-4949-A917-D1164E14EAA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64576C9A-FCD9-4410-B590-AB43F9F85D2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"229AC4E3-AFBA-4EF4-8534-8FBE1E630253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B91503A-E8DC-4DFF-98D4-687B5AE41438\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"241A4B59-7BBC-4656-93AC-7DD8BE29EB58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00D0DBDC-1559-406D-AADC-12B5ABDD2BE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5294FCC-3933-4CD5-8DFE-BCDC00F4BD18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5CA3E33-7CC6-4AC5-999A-3C46D7FD14A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAADC158-B7EF-4135-B383-0DA43065B43E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"261A4A17-3B9E-46E6-897B-DB0C8358A1D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAAC8483-5060-428B-8D8E-C30E5823BB3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44A511B6-72EC-4200-8C1C-BDE30BC2431A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B03C644D-0EF9-4586-96D5-5DEE78D9D5C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47AD8A88-DAF0-4206-8661-70075BA2AE55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42AD17CD-545F-425A-92CF-0EE5F5B5F74E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC0B9503-9AD0-4A1A-BD4F-4B902BFC8E5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0660536D-7F82-4B91-8B84-704D26FE989F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2037E8C-43E8-4121-B877-1834282ACD2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFCA5E85-9AFA-429A-AC51-8D8EC2841330\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D41ABE25-DECD-4068-93DA-0B85281FD93A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84600406-0CE2-46EA-A5AD-4CC0D3494AB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A96FA9ED-7529-440D-984D-6340B94D8243\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3D70AB0-2910-4191-9980-5BA78E8F2E11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A30D0EE-1AED-4C99-8A22-24E47212F3FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4169CA4B-C4F5-499A-A35A-49DD43AC0A22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3AC9749-52C5-4E17-8A77-5F4ED91FA8E3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.\"}, {\"lang\": \"es\", \"value\": \"Error de persistencia de signo en entero en la funci\\u00f3n \\\"elf_get_dynamic_info\\\" en \\\"elf/dynamic-link.h\\\" de la librer\\u00eda C GNU (tambi\\u00e9n conocida como glibc or libc6) v2.0.1 hasta v2.11.1, cuando se usa la opci\\u00f3n --verify, permite a atacantes remotos asistidos por usuarios ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de un programa ELF manipulado con un valor negativo para cierto miembro de esctructura \\\"d_tag\\\" en la cabecera ELF\"}]",
"id": "CVE-2010-0830",
"lastModified": "2024-11-21T01:13:02.630",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2010-06-01T20:30:02.820",
"references": "[{\"url\": \"http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://frugalware.org/security/662\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://secunia.com/advisories/39900\", \"source\": \"security@ubuntu.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201011-01.xml\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://securitytracker.com/id?1024044\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://www.debian.org/security/2010/dsa-2058\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://www.securityfocus.com/bid/40063\", \"source\": \"security@ubuntu.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-944-1\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1246\", \"source\": \"security@ubuntu.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/58915\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html\", \"source\": \"security@ubuntu.com\"}, {\"url\": \"http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://frugalware.org/security/662\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/39900\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201011-01.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1024044\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2010/dsa-2058\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/40063\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-944-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1246\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/58915\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@ubuntu.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-0830\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2010-06-01T20:30:02.820\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.\"},{\"lang\":\"es\",\"value\":\"Error de persistencia de signo en entero en la funci\u00f3n \\\"elf_get_dynamic_info\\\" en \\\"elf/dynamic-link.h\\\" de la librer\u00eda C GNU (tambi\u00e9n conocida como glibc or libc6) v2.0.1 hasta v2.11.1, cuando se usa la opci\u00f3n --verify, permite a atacantes remotos asistidos por usuarios ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un programa ELF manipulado con un valor negativo para cierto miembro de esctructura \\\"d_tag\\\" en la cabecera ELF\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA795F7-8AAC-42BA-971B-601346704BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CADA314-C0D0-40F8-9019-884F17D0B54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"255E0C0D-0B70-4C10-BF7C-34193AA24C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F424F2F5-D7E4-4A13-A8CF-32D466610BDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC4E7AE-BDC4-48F1-9FDE-3F3FAA3F40F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1329215-C53A-40D5-8E9C-F457D092E483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2A0F12-FD00-40B9-86AD-7D082385E5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ED8F0E8-A969-4F7F-A100-662F4A5426FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9416576F-A605-45BE-AA01-FEF357A66979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE582B8F-4E31-4D0F-B2F9-AC83C855F751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB56D9C9-13B3-418C-B06C-0997E165F1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D5667D-5EA4-4B44-BF8A-9C10506BD4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F23D2F-A01F-4949-A917-D1164E14EAA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64576C9A-FCD9-4410-B590-AB43F9F85D2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"229AC4E3-AFBA-4EF4-8534-8FBE1E630253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B91503A-E8DC-4DFF-98D4-687B5AE41438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241A4B59-7BBC-4656-93AC-7DD8BE29EB58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00D0DBDC-1559-406D-AADC-12B5ABDD2BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5294FCC-3933-4CD5-8DFE-BCDC00F4BD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CA3E33-7CC6-4AC5-999A-3C46D7FD14A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAADC158-B7EF-4135-B383-0DA43065B43E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261A4A17-3B9E-46E6-897B-DB0C8358A1D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAC8483-5060-428B-8D8E-C30E5823BB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A511B6-72EC-4200-8C1C-BDE30BC2431A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03C644D-0EF9-4586-96D5-5DEE78D9D5C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47AD8A88-DAF0-4206-8661-70075BA2AE55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42AD17CD-545F-425A-92CF-0EE5F5B5F74E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0B9503-9AD0-4A1A-BD4F-4B902BFC8E5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0660536D-7F82-4B91-8B84-704D26FE989F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2037E8C-43E8-4121-B877-1834282ACD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCA5E85-9AFA-429A-AC51-8D8EC2841330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41ABE25-DECD-4068-93DA-0B85281FD93A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84600406-0CE2-46EA-A5AD-4CC0D3494AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96FA9ED-7529-440D-984D-6340B94D8243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3D70AB0-2910-4191-9980-5BA78E8F2E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A30D0EE-1AED-4C99-8A22-24E47212F3FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4169CA4B-C4F5-499A-A35A-49DD43AC0A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3AC9749-52C5-4E17-8A77-5F4ED91FA8E3\"}]}]}],\"references\":[{\"url\":\"http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://frugalware.org/security/662\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://secunia.com/advisories/39900\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201011-01.xml\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://securitytracker.com/id?1024044\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2058\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.securityfocus.com/bid/40063\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-944-1\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1246\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/58915\",\"source\":\"security@ubuntu.com\"},{\"url\":\"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://frugalware.org/security/662\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/39900\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201011-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1024044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/40063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-944-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/58915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…