Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
7.2HIGHNVD
EPSS
6.6%
top 8.79%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 22
Latest updateMay 13

Description

The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages2 packages

Also affects: Ubuntu Linux 10.04, 10.10, 9.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-79mw-6jhw-7997: The IA32 system call emulation functionality in arch/x86/ia32/ia32entry2022-05-13
CVEList
CVE-2010-3301: The IA32 system call emulation functionality in arch/x86/ia32/ia32entry2010-09-22

💥Exploits & PoCs

1
Exploit-DB
Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation2010-09-16

🔍Detection Rules

3
YARA
Linux_Exploit_CVE_2010_3301_79d52efd
YARA
Linux_Exploit_CVE_2010_3301_d0eb0924
YARA
Linux_Exploit_CVE_2010_3301_a5828970

📋Vendor Advisories

6
Ubuntu
Linux kernel vulnerabilities2011-03-03
Ubuntu
Linux kernel vulnerabilities2011-02-28
Ubuntu
Linux kernel vulnerabilities2011-02-25
Ubuntu
Linux kernel vulnerabilities2011-01-10
Ubuntu
Linux kernel vulnerabilities2010-09-17

💬Community

1
Bugzilla
CVE-2010-3301 kernel: IA32 System Call Entry Point Vulnerability2010-09-16
CVE-2010-3301 — Linux Kernel vulnerability | cvebase