Lucene search

K
nvd[email protected]NVD:CVE-2005-2872
HistorySep 09, 2005 - 7:07 p.m.

CVE-2005-2872

2005-09-0919:07:00
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.1 High

AI Score

Confidence

High

0.167 Low

EPSS

Percentile

96.1%

The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.0test1
OR
linuxlinux_kernelMatch2.6.0test10
OR
linuxlinux_kernelMatch2.6.0test11
OR
linuxlinux_kernelMatch2.6.0test2
OR
linuxlinux_kernelMatch2.6.0test3
OR
linuxlinux_kernelMatch2.6.0test4
OR
linuxlinux_kernelMatch2.6.0test5
OR
linuxlinux_kernelMatch2.6.0test6
OR
linuxlinux_kernelMatch2.6.0test7
OR
linuxlinux_kernelMatch2.6.0test8
OR
linuxlinux_kernelMatch2.6.0test9
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.1rc1
OR
linuxlinux_kernelMatch2.6.1rc2
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.6rc1
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.7rc1
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.8rc1
OR
linuxlinux_kernelMatch2.6.8rc2
OR
linuxlinux_kernelMatch2.6.8rc3
OR
linuxlinux_kernelMatch2.6.8.1
OR
linuxlinux_kernelMatch2.6.8.1.5
OR
linuxlinux_kernelMatch2.6.8.1.5386
OR
linuxlinux_kernelMatch2.6.8.1.5686
OR
linuxlinux_kernelMatch2.6.8.1.5686_smp
OR
linuxlinux_kernelMatch2.6.8.1.5amd64
OR
linuxlinux_kernelMatch2.6.8.1.5amd64_k8
OR
linuxlinux_kernelMatch2.6.8.1.5amd64_k8_smp
OR
linuxlinux_kernelMatch2.6.8.1.5amd64_xeon
OR
linuxlinux_kernelMatch2.6.8.1.5k7
OR
linuxlinux_kernelMatch2.6.8.1.5k7_smp
OR
linuxlinux_kernelMatch2.6.8.1.5power3
OR
linuxlinux_kernelMatch2.6.8.1.5power3_smp
OR
linuxlinux_kernelMatch2.6.8.1.5power4
OR
linuxlinux_kernelMatch2.6.8.1.5power4_smp
OR
linuxlinux_kernelMatch2.6.8.1.5powerpc
OR
linuxlinux_kernelMatch2.6.8.1.5powerpc_smp
OR
linuxlinux_kernelMatch2.6.92.6.20
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.10rc2
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11rc2
OR
linuxlinux_kernelMatch2.6.11rc3
OR
linuxlinux_kernelMatch2.6.11rc4
OR
linuxlinux_kernelMatch2.6.11.1
OR
linuxlinux_kernelMatch2.6.11.2
OR
linuxlinux_kernelMatch2.6.11.3
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11_rc1_bk6
OR
linuxlinux_kernelMatch2.6_test9_cvs

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.1 High

AI Score

Confidence

High

0.167 Low

EPSS

Percentile

96.1%