CVE-2005-2456

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array.

References

http://secunia.com/advisories/16298

http://secunia.com/advisories/16500

http://secunia.com/advisories/17002

http://secunia.com/advisories/17073

http://secunia.com/advisories/17826

http://secunia.com/advisories/18056

http://secunia.com/advisories/18059

http://www.debian.org/security/2005/dsa-921

http://www.debian.org/security/2005/dsa-922

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba;hp=ecade4893a139cc35d4fe345ce70242ede5358c4;hb=a4f1bac62564049ea4718c4624b0fadc9f597c84;f=net/xfrm/xfrm_user.c

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a4f1bac62564049ea4718c4624b0fadc9f597c84

http://www.mail-archive.com/[email protected]/msg00520.html

http://www.mandriva.com/security/advisories?name=MDKSA-2005:219

http://www.mandriva.com/security/advisories?name=MDKSA-2005:220

http://www.novell.com/linux/security/advisories/2005_50_kernel.html

http://www.redhat.com/support/errata/RHSA-2005-514.html

http://www.redhat.com/support/errata/RHSA-2005-663.html

http://www.securityfocus.com/archive/1/427980/100/0/threaded

http://www.securityfocus.com/bid/14477

http://www.vupen.com/english/advisories/2005/1878

https://exchange.xforce.ibmcloud.com/vulnerabilities/21710

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10858

https://usn.ubuntu.com/169-1/

Details

Source: MITRE

Published: 2005-08-04

Updated: 2018-10-19

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

Tenable Plugins

View all (10 total)

IDNameProductFamilySeverity
22788Debian DSA-922-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
high
22787Debian DSA-921-1 : kernel-source-2.4.27 - several vulnerabilitiesNessusDebian Local Security Checks
medium
21943CentOS 4 : kernel (CESA-2005:514)NessusCentOS Local Security Checks
high
21849CentOS 3 : kernel (CESA-2005:663)NessusCentOS Local Security Checks
medium
20575Ubuntu 4.10 / 5.04 : linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities (USN-169-1)NessusUbuntu Local Security Checks
medium
20451MDKSA-2005:220 : kernelNessusMandriva Local Security Checks
medium
20450Mandrake Linux Security Advisory : kernel (MDKSA-2005:219)NessusMandriva Local Security Checks
high
19989RHEL 4 : kernel (RHSA-2005:514)NessusRed Hat Local Security Checks
high
19832RHEL 3 : kernel (RHSA-2005:663)NessusRed Hat Local Security Checks
medium
801409CentOS RHSA-2005-514 Security CheckLog Correlation EngineGeneric
high