2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-3055" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2005-09-26T19:03:00.000" ,
"lastModified" : "2018-10-19T15:34:30.157" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 2.1
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "F90242EF-048B-4539-AA41-87AA84875A9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C4E9325-2A70-4E15-9AAF-5588BF218055"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "01402A85-B681-4DE0-B7BB-F52567DA29E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FC53528-A67F-42DF-B8DA-778A65893F9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CDE1E92-C64D-4A3B-95A2-384BD772B28B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B130EB7-A951-4717-A906-E2F602F7B69F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D90502F-EC45-4ADC-9428-B94346DA660B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "2422569B-02ED-4028-83D8-D778657596B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "E66E4653-1A55-4827-888B-E0776E32ED28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C8994CB-7F94-43FB-8B84-06AEBB34EAE0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F87AA89-F377-4BEB-B69F-809F5DA6176C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C27AF62E-A026-43E9-89E6-CD807CE9DF51"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D343B121-C007-49F8-9DE8-AA05CE58FF0B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "169446DE-67F8-4738-91FE-ED8058118F80"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "6AC88830-A9BC-4607-B572-A4B502FC9FD0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*" ,
"matchCriteriaId" : "476CB3A5-D022-4F13-AAEF-CB6A5785516A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "860F9225-8A3F-492C-B72B-5EFFB322802C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57E23724-2CA4-4211-BB83-38661BE7E6AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6143DC1F-D62E-4DB2-AF43-30A07413D68B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "93F0834D-C5EA-4C96-8D6C-3123ECF78F8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D9F976B-1328-40FE-A1F2-C1DF3F836604"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*" ,
"matchCriteriaId" : "10E1B011-8D20-448E-9DD5-023DD30D1FE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A29A4BC-0442-458E-A874-BF0D0F2870FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "298266AB-2A36-4606-BF80-2185FC56C4D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C2658CA-56C2-494F-AC42-618EC413CBDF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "04F25DE0-CA8E-4F57-87A5-C30D89CC9E44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "F87F764B-4097-44FA-B96E-A5DA75E31F7B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=linux-kernel&m=112766129313883" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17826" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/17917" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/17918" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/19374" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/21035" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/21136" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/21465" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/21983" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/22417" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2006/dsa-1017" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0437.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Not Applicable"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0575.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Not Applicable"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0579.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Not Applicable"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0580.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Not Applicable"
]
} ,
{
"url" : "http://www.securityfocus.com/advisories/9806" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/419522/100/0/threaded" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/14955" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/1863" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://usn.ubuntu.com/219-1/" ,
"source" : "secalert@redhat.com"
}
]
}