CVE-2005-2800

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.

References

http://secunia.com/advisories/17826

http://secunia.com/advisories/17918

http://secunia.com/advisories/18510

http://secunia.com/advisories/19374

http://www.debian.org/security/2006/dsa-1017

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=729d70f5dfd663b44bca68a4479c96bde7e535d6

http://www.mandriva.com/security/advisories?name=MDKSA-2005:218

http://www.mandriva.com/security/advisories?name=MDKSA-2005:219

http://www.mandriva.com/security/advisories?name=MDKSA-2005:220

http://www.redhat.com/support/errata/RHSA-2006-0101.html

http://www.securityfocus.com/archive/1/419522/100/0/threaded

http://www.securityfocus.com/archive/1/427980/100/0/threaded

http://www.securityfocus.com/bid/14790

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954

Details

Source: MITRE

Published: 2005-09-06

Updated: 2018-10-19

Type: CWE-399

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
22559Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
critical
21977CentOS 4 : kernel (CESA-2006:0101)NessusCentOS Local Security Checks
high
20732RHEL 4 : kernel (RHSA-2006:0101)NessusRed Hat Local Security Checks
high
20588Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-178-1)NessusUbuntu Local Security Checks
medium
20451MDKSA-2005:220 : kernelNessusMandriva Local Security Checks
medium
20450Mandrake Linux Security Advisory : kernel (MDKSA-2005:219)NessusMandriva Local Security Checks
high
801413CentOS RHSA-2006-0101 Security CheckLog Correlation EngineGeneric
high