ID CVE-2005-0136
Summary The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 30-10-2018 - 16:26)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2013-04-29T04:15:02.678-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
family unix
id oval:org.mitre.oval:def:11628
status accepted
submitted 2010-07-09T03:56:16-04:00
title The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
version 29
redhat via4
advisories
  • rhsa
    id RHSA-2005:420
  • rhsa
    id RHSA-2005:663
rpms
  • kernel-0:2.6.9-11.EL
  • kernel-debuginfo-0:2.6.9-11.EL
  • kernel-devel-0:2.6.9-11.EL
  • kernel-doc-0:2.6.9-11.EL
  • kernel-hugemem-0:2.6.9-11.EL
  • kernel-hugemem-devel-0:2.6.9-11.EL
  • kernel-smp-0:2.6.9-11.EL
  • kernel-smp-devel-0:2.6.9-11.EL
  • kernel-0:2.4.21-37.EL
  • kernel-BOOT-0:2.4.21-37.EL
  • kernel-debuginfo-0:2.4.21-37.EL
  • kernel-doc-0:2.4.21-37.EL
  • kernel-hugemem-0:2.4.21-37.EL
  • kernel-hugemem-unsupported-0:2.4.21-37.EL
  • kernel-smp-0:2.4.21-37.EL
  • kernel-smp-unsupported-0:2.4.21-37.EL
  • kernel-source-0:2.4.21-37.EL
  • kernel-unsupported-0:2.4.21-37.EL
refmap via4
confirm http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11
misc
mlist
  • [kernel-svn-changes] 20050816 r3920 - in branches/dist/sarge-security: . kernel kernel/i386 kernel/source kernel/source/kernel-source-2.6.8-2.6.8/debian
  • [linux-ia64] 20040916 Re: [Patch] Per CPU MCA/INIT data save areas
secunia 17002
vupen ADV-2005-1878
Last major update 30-10-2018 - 16:26
Published 31-12-2005 - 05:00
Last modified 30-10-2018 - 16:26
Back to Top