Vulnerability Details : CVE-2010-1085
The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.
Vulnerability category: Denial of service
Products affected by CVE-2010-1085
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-1085
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-1085
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST |
CWE ids for CVE-2010-1085
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2010-1085
-
Red Hat 2010-04-07Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2010-1085 This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and Red Hat Enterprise MRG as they did not include the affected function. A future update in Red Hat Enterprise Linux 4 and 5 may address this flaw.
References for CVE-2010-1085
-
http://nctritech.net/bugreport.txt
Broken Link
-
http://lkml.org/lkml/2010/2/5/322
LKML: "": PROBLEM: hda-intel divide by zero kernel crash in azx_position_ok()Mailing List;Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0394.html
SupportThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0398.html
SupportThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10027
Repository / Oval RepositoryThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/02/22/2
oss-security - CVE request: kernel: ALSA: hda-intel: Avoid divide by zero crashMailing List;Patch;Third Party Advisory
-
http://support.avaya.com/css/P8/documents/100088287
ASA-2010-144 (RHSA-2010-0398)Third Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VMSA-2011-0003.2Third Party Advisory
-
http://support.avaya.com/css/P8/documents/100090459
ASA-2010-146 (RHSA-2010-0394 RHSA-2010-0424)Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=567168
567168 – (CVE-2010-1085) CVE-2010-1085 kernel: ALSA: hda-intel: Avoid divide by zero crashIssue Tracking;Patch;Third Party Advisory
-
http://www.securityfocus.com/archive/1/516397/100/0/threaded
SecurityFocusThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/38348
Linux Kernel 'azx_position_ok()' Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
Jump to