CVE-2005-0750

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.

References

http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html

http://marc.info/?l=bugtraq&m=111204562102633&w=2

http://www.redhat.com/support/errata/RHSA-2005-283.html

http://www.redhat.com/support/errata/RHSA-2005-284.html

http://www.redhat.com/support/errata/RHSA-2005-293.html

http://www.redhat.com/support/errata/RHSA-2005-366.html

http://www.securityfocus.com/bid/12911

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532

https://exchange.xforce.ibmcloud.com/vulnerabilities/19844

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719

Details

Source: MITRE

Published: 2005-03-27

Updated: 2017-10-11

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*

cpe:2.3:o:redhat:linux:7.3:*:i686:*:*:*:*:*

cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*

cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*

cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
21928CentOS 3 / 4 : kernel (CESA-2005:366)NessusCentOS Local Security Checks
high
21923CentOS 3 : kernel (CESA-2005:293)NessusCentOS Local Security Checks
high
20489Ubuntu 4.10 : linux-source-2.6.8.1 vulnerabilities (USN-103-1)NessusUbuntu Local Security Checks
high
18599Mandrake Linux Security Advisory : kernel-2.4 (MDKSA-2005:111)NessusMandriva Local Security Checks
high
18598Mandrake Linux Security Advisory : kernel (MDKSA-2005:110)NessusMandriva Local Security Checks
high
18161RHEL 2.1 : kernel (RHSA-2005:283)NessusRed Hat Local Security Checks
high
18128RHEL 3 : kernel (RHSA-2005:293)NessusRed Hat Local Security Checks
high
18095RHEL 4 : kernel (RHSA-2005:366)NessusRed Hat Local Security Checks
high
17982SUSE-SA:2005:021: kernelNessusSuSE Local Security Checks
high
801608Red Hat 2005-293 Security CheckLog Correlation EngineGeneric
high
801607Red Hat 2005-283 Security CheckLog Correlation EngineGeneric
high
801406CentOS RHSA-2005-366 Security CheckLog Correlation EngineGeneric
high