module
Reliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation
Disclosed | Created |
---|---|
Oct 20, 2010 | Dec 22, 2019 |
Disclosed
Oct 20, 2010
Created
Dec 22, 2019
Description
This module exploits a vulnerability in the `rds_page_copy_user` function
in `net/rds/page.c` (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8
to execute code as root (CVE-2010-3904).
This module has been tested successfully on:
Fedora 13 (i686) kernel version 2.6.33.3-85.fc13.i686.PAE; and
Ubuntu 10.04 (x86_64) with kernel version 2.6.32-21-generic.
in `net/rds/page.c` (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8
to execute code as root (CVE-2010-3904).
This module has been tested successfully on:
Fedora 13 (i686) kernel version 2.6.33.3-85.fc13.i686.PAE; and
Ubuntu 10.04 (x86_64) with kernel version 2.6.32-21-generic.
Authors
Dan Rosenberg
bcoles bcoles@gmail.com
bcoles bcoles@gmail.com
Platform
Linux
Architectures
x86, x64
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.