2023-04-24 12:24:31 +02:00
|
|
|
{
|
|
|
|
"id": "CVE-2005-1763",
|
|
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
|
|
"published": "2005-06-09T04:00:00.000",
|
|
|
|
"lastModified": "2018-10-19T15:31:57.193",
|
|
|
|
"vulnStatus": "Modified",
|
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory."
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {
|
|
|
|
"cvssMetricV2": [
|
|
|
|
{
|
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
|
|
|
"cvssData": {
|
|
|
|
"version": "2.0",
|
|
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
|
|
"accessVector": "LOCAL",
|
|
|
|
"accessComplexity": "LOW",
|
|
|
|
"authentication": "NONE",
|
|
|
|
"confidentialityImpact": "COMPLETE",
|
|
|
|
"integrityImpact": "COMPLETE",
|
|
|
|
"availabilityImpact": "COMPLETE",
|
|
|
|
"baseScore": 7.2
|
|
|
|
},
|
|
|
|
"baseSeverity": "HIGH",
|
|
|
|
"exploitabilityScore": 3.9,
|
|
|
|
"impactScore": 10.0,
|
|
|
|
"acInsufInfo": false,
|
|
|
|
"obtainAllPrivilege": true,
|
|
|
|
"obtainUserPrivilege": false,
|
|
|
|
"obtainOtherPrivilege": false,
|
|
|
|
"userInteractionRequired": false
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"weaknesses": [
|
|
|
|
{
|
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
|
|
|
"description": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "NVD-CWE-Other"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"configurations": [
|
|
|
|
{
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "5595E484-647C-4F85-94AB-5A4D55CD766B"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "C7EAAD04-D7C4-43DE-B488-1AAD014B503E"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"references": [
|
2024-04-04 08:46:00 +00:00
|
|
|
{
|
|
|
|
"url": "http://secunia.com/advisories/17073",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "http://secunia.com/advisories/18056",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
},
|
2023-04-24 12:24:31 +02:00
|
|
|
{
|
|
|
|
"url": "http://www.debian.org/security/2005/dsa-922",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "http://www.novell.com/linux/security/advisories/2005_29_kernel.html",
|
|
|
|
"source": "secalert@redhat.com",
|
|
|
|
"tags": [
|
|
|
|
"Patch",
|
|
|
|
"Vendor Advisory"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-514.html",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "http://www.securityfocus.com/bid/13903",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10182",
|
|
|
|
"source": "secalert@redhat.com"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|