Lucene search

K
cve[email protected]CVE-2005-3273
HistoryOct 21, 2005 - 1:02 a.m.

CVE-2005-3273

2005-10-2101:02:00
CWE-264
web.nvd.nist.gov
42
linux kernel
security
cve-2005-3273
rose_rt_ioctl
array out-of-bounds error

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.1 Medium

AI Score

Confidence

High

0.018 Low

EPSS

Percentile

88.1%

The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.2
OR
linuxlinux_kernelMatch2.4.3
OR
linuxlinux_kernelMatch2.4.4
OR
linuxlinux_kernelMatch2.4.5
OR
linuxlinux_kernelMatch2.4.6
OR
linuxlinux_kernelMatch2.4.7
OR
linuxlinux_kernelMatch2.4.8
OR
linuxlinux_kernelMatch2.4.9
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.18x86
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OR
linuxlinux_kernelMatch2.4.20
OR
linuxlinux_kernelMatch2.4.21
OR
linuxlinux_kernelMatch2.4.21pre1
OR
linuxlinux_kernelMatch2.4.21pre4
OR
linuxlinux_kernelMatch2.4.21pre7
OR
linuxlinux_kernelMatch2.4.22
OR
linuxlinux_kernelMatch2.4.23
OR
linuxlinux_kernelMatch2.4.23pre9
OR
linuxlinux_kernelMatch2.4.23_ow2
OR
linuxlinux_kernelMatch2.4.24
OR
linuxlinux_kernelMatch2.4.24_ow1
OR
linuxlinux_kernelMatch2.4.25
OR
linuxlinux_kernelMatch2.4.26
OR
linuxlinux_kernelMatch2.4.27
OR
linuxlinux_kernelMatch2.4.27pre1
OR
linuxlinux_kernelMatch2.4.27pre2
OR
linuxlinux_kernelMatch2.4.27pre3
OR
linuxlinux_kernelMatch2.4.27pre4
OR
linuxlinux_kernelMatch2.4.27pre5
OR
linuxlinux_kernelMatch2.4.28
OR
linuxlinux_kernelMatch2.4.29
OR
linuxlinux_kernelMatch2.4.29rc1
OR
linuxlinux_kernelMatch2.4.29rc2
OR
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.1rc1
OR
linuxlinux_kernelMatch2.6.1rc2
OR
linuxlinux_kernelMatch2.6.1rc3
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.2rc1
OR
linuxlinux_kernelMatch2.6.2rc2
OR
linuxlinux_kernelMatch2.6.2rc3
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.3rc1
OR
linuxlinux_kernelMatch2.6.3rc2
OR
linuxlinux_kernelMatch2.6.3rc3
OR
linuxlinux_kernelMatch2.6.3rc4
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.4rc1
OR
linuxlinux_kernelMatch2.6.4rc2
OR
linuxlinux_kernelMatch2.6.4rc3
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.5rc1
OR
linuxlinux_kernelMatch2.6.5rc2
OR
linuxlinux_kernelMatch2.6.5rc3
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.6rc1
OR
linuxlinux_kernelMatch2.6.6rc2
OR
linuxlinux_kernelMatch2.6.6rc3
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.7rc1
OR
linuxlinux_kernelMatch2.6.7rc2
OR
linuxlinux_kernelMatch2.6.7rc3
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.8rc1
OR
linuxlinux_kernelMatch2.6.8rc2
OR
linuxlinux_kernelMatch2.6.8rc3
OR
linuxlinux_kernelMatch2.6.8rc4
OR
linuxlinux_kernelMatch2.6.8.1
OR
linuxlinux_kernelMatch2.6.9
OR
linuxlinux_kernelMatch2.6.9rc1
OR
linuxlinux_kernelMatch2.6.9rc2
OR
linuxlinux_kernelMatch2.6.9rc3
OR
linuxlinux_kernelMatch2.6.9rc4
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.10rc1
OR
linuxlinux_kernelMatch2.6.10rc2
OR
linuxlinux_kernelMatch2.6.10rc3
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11rc1
OR
linuxlinux_kernelMatch2.6.11rc2
OR
linuxlinux_kernelMatch2.6.11rc3
OR
linuxlinux_kernelMatch2.6.11rc4
OR
linuxlinux_kernelMatch2.6.11rc5
OR
linuxlinux_kernelMatch2.6.11.1
OR
linuxlinux_kernelMatch2.6.11.2
OR
linuxlinux_kernelMatch2.6.11.3
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.9
OR
linuxlinux_kernelMatch2.6.11.10
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.1 Medium

AI Score

Confidence

High

0.018 Low

EPSS

Percentile

88.1%