Lucene search

K
cve[email protected]CVE-2005-0003
HistoryApr 14, 2005 - 4:00 a.m.

CVE-2005-0003

2005-04-1404:00:00
web.nvd.nist.gov
39
cve-2005-0003
linux kernel
elf
denial of service
system crash
arbitrary code
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.2%

The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.

Affected configurations

NVD
Node
avayamn100
OR
avayanetwork_routing
OR
avayaconverged_communications_serverMatch2.0
OR
avayas8710Matchr2.0.0
OR
avayas8710Matchr2.0.1
OR
avayamodular_messaging_message_storage_serverMatch1.1
OR
avayamodular_messaging_message_storage_serverMatch2.0
OR
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.2
OR
linuxlinux_kernelMatch2.4.3
OR
linuxlinux_kernelMatch2.4.4
OR
linuxlinux_kernelMatch2.4.5
OR
linuxlinux_kernelMatch2.4.6
OR
linuxlinux_kernelMatch2.4.7
OR
linuxlinux_kernelMatch2.4.8
OR
linuxlinux_kernelMatch2.4.9
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.18x86
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OR
linuxlinux_kernelMatch2.4.20
OR
linuxlinux_kernelMatch2.4.21
OR
linuxlinux_kernelMatch2.4.21pre1
OR
linuxlinux_kernelMatch2.4.21pre4
OR
linuxlinux_kernelMatch2.4.21pre7
OR
linuxlinux_kernelMatch2.4.22
OR
linuxlinux_kernelMatch2.4.23
OR
linuxlinux_kernelMatch2.4.23pre9
OR
linuxlinux_kernelMatch2.4.23_ow2
OR
linuxlinux_kernelMatch2.4.24
OR
linuxlinux_kernelMatch2.4.24_ow1
OR
linuxlinux_kernelMatch2.4.25
OR
linuxlinux_kernelMatch2.4.26
OR
linuxlinux_kernelMatch2.4.27
OR
linuxlinux_kernelMatch2.4.27pre1
OR
linuxlinux_kernelMatch2.4.27pre2
OR
linuxlinux_kernelMatch2.4.27pre3
OR
linuxlinux_kernelMatch2.4.27pre4
OR
linuxlinux_kernelMatch2.4.27pre5
OR
linuxlinux_kernelMatch2.4.28
OR
linuxlinux_kernelMatch2.4.29rc1
OR
linuxlinux_kernelMatch2.4.29rc2
OR
mandrakesoftmandrake_linuxMatch9.2
OR
mandrakesoftmandrake_linuxMatch9.2amd64
OR
mandrakesoftmandrake_linuxMatch10.0
OR
mandrakesoftmandrake_linuxMatch10.0amd64
OR
mandrakesoftmandrake_linuxMatch10.1
OR
mandrakesoftmandrake_linuxMatch10.1x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch2.1
OR
mandrakesoftmandrake_linux_corporate_serverMatch2.1x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0
OR
redhatenterprise_linuxMatch3.0advanced_servers
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation
OR
redhatenterprise_linux_desktopMatch3.0
Node
avayaintuity_audixlx
OR
mandrakesoftmandrake_multi_network_firewallMatch8.2
OR
avayas8300Matchr2.0.0
OR
avayas8300Matchr2.0.1
OR
avayas8500Matchr2.0.0
OR
avayas8500Matchr2.0.1
OR
avayas8700Matchr2.0.0
OR
avayas8700Matchr2.0.1

References

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.2%