CVE-2005-3044

LOW

Description

Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.

References

http://kernel.org/git/?p=linux/kernel/git/aegl/linux-2.6.git;a=commitdiff;h=35311d6478077f7bfe35c1c653193e658bf32686

http://kernel.org/git/?p=linux/kernel/git/chrisw/linux-2.6.13.y.git;a=commit;h=98debffa9114b60138b3dbd4d02ce13f01a07ab4

http://secunia.com/advisories/17826

http://secunia.com/advisories/17917

http://secunia.com/advisories/17918

http://secunia.com/advisories/18510

http://secunia.com/advisories/18562

http://secunia.com/advisories/19374

http://www.debian.org/security/2006/dsa-1017

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.2

http://www.mandriva.com/security/advisories?name=MDKSA-2005:218

http://www.mandriva.com/security/advisories?name=MDKSA-2005:219

http://www.mandriva.com/security/advisories?name=MDKSA-2005:220

http://www.mandriva.com/security/advisories?name=MDKSA-2005:235

http://www.mandriva.com/security/advisories?name=MDKSA-2006:059

http://www.redhat.com/support/errata/RHSA-2006-0101.html

http://www.redhat.com/support/errata/RHSA-2006-0140.html

http://www.securityfocus.com/advisories/9806

http://www.securityfocus.com/archive/1/419522/100/0/threaded

http://www.securityfocus.com/archive/1/427980/100/0/threaded

http://www.securityfocus.com/archive/1/427981/100/0/threaded

http://www.securityfocus.com/archive/1/428058/100/0/threaded

http://www.securityfocus.com/bid/14902

http://www.ubuntu.com/usn/usn-187-1

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9561

Details

Source: MITRE

Published: 2005-09-22

Updated: 2018-10-19

Risk Information

CVSS v2.0

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 2.6.13 (inclusive)

cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
22559Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
critical
21977CentOS 4 : kernel (CESA-2006:0101)NessusCentOS Local Security Checks
high
21881CentOS 3 : kernel (CESA-2006:0140)NessusCentOS Local Security Checks
high
21133Mandrake Linux Security Advisory : kernel (MDKSA-2006:059)NessusMandriva Local Security Checks
high
20751RHEL 3 : kernel (RHSA-2006:0140)NessusRed Hat Local Security Checks
high
20732RHEL 4 : kernel (RHSA-2006:0101)NessusRed Hat Local Security Checks
high
20599Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-187-1)NessusUbuntu Local Security Checks
low
20466Mandrake Linux Security Advisory : kernel (MDKSA-2005:235)NessusMandriva Local Security Checks
medium
20451MDKSA-2005:220 : kernelNessusMandriva Local Security Checks
medium
20450Mandrake Linux Security Advisory : kernel (MDKSA-2005:219)NessusMandriva Local Security Checks
high
801415CentOS RHSA-2006-0140 Security CheckLog Correlation EngineGeneric
high
801413CentOS RHSA-2006-0101 Security CheckLog Correlation EngineGeneric
high