Vulnerability Name:

CVE-2005-0400 (CCN-19866)

Assigned:2005-03-21
Published:2005-03-21
Updated:2018-10-03
Summary:The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: MISC
Type: Vendor Advisory
http://arkoon.net/advisories/ext2-make-empty-leak.txt

Source: MITRE
Type: CNA
CVE-2005-0400

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: CONFIRM
Type: UNKNOWN
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.6

Source: BUGTRAQ
Type: UNKNOWN
20050401 Information leak in the Linux kernel ext2 implementation

Source: CCN
Type: RHSA-2005-366
kernel security update

Source: CCN
Type: RHSA-2005-663
Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6

Source: CCN
Type: RHSA-2006-0190
kernel security update

Source: CCN
Type: RHSA-2006-0191
kernel security update

Source: CCN
Type: SA14713
Linux Kernel Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
14713

Source: SECUNIA
Type: UNKNOWN
17002

Source: SECUNIA
Type: UNKNOWN
18684

Source: CCN
Type: CIAC INFORMATION BULLETIN P-188
Security Vulnerabilities Addressed in Red Hat Kernel Update

Source: REDHAT
Type: UNKNOWN
RHSA-2005:366

Source: REDHAT
Type: UNKNOWN
RHSA-2005:663

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0190

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0191

Source: BID
Type: UNKNOWN
12932

Source: CCN
Type: BID-12932
Linux Kernel EXT2 File System Information Leak Vulnerability

Source: CCN
Type: USN-103-1
Linux kernel vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2005-1878

Source: FEDORA
Type: UNKNOWN
FLSA:152532

Source: XF
Type: UNKNOWN
kernel-ext2-information-disclosure(19866)

Source: XF
Type: UNKNOWN
kernel-ext2-information-disclosure(19866)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10336

Source: UBUNTU
Type: UNKNOWN
USN-103-1

Source: SUSE
Type: SUSE-SA:2005:029
kernel: several security problems

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version <= 2.6.11.6)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
  • AND
  • cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20050400
    V
    CVE-2005-0400
    2015-11-16
    oval:org.mitre.oval:def:10336
    V
    The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
    2013-04-29
    oval:com.redhat.rhsa:def:20050663
    P
    RHSA-2005:663: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6 (Important)
    2005-09-28
    oval:com.redhat.rhsa:def:20050366
    P
    RHSA-2005:366: kernel security update (Important)
    2005-08-09
    BACK
    linux linux kernel *
    linux linux kernel 2.6.6 rc1
    linux linux kernel 2.6.11 rc1
    linux linux kernel 2.6.2
    linux linux kernel 2.6.0 test9
    linux linux kernel 2.6.0 test8
    linux linux kernel 2.6.0 test7
    linux linux kernel 2.6.0 test6
    linux linux kernel 2.6.0 test5
    linux linux kernel 2.6.0 test4
    linux linux kernel 2.6.0 test3
    linux linux kernel 2.6.0 test2
    linux linux kernel 2.6.0 test11
    linux linux kernel 2.6.0 test10
    linux linux kernel 2.6.0 test1
    linux linux kernel 2.6.9 rc4
    linux linux kernel 2.6.9 rc3
    linux linux kernel 2.6.9 rc2
    linux linux kernel 2.6.9 rc1
    linux linux kernel 2.6.8 rc4
    linux linux kernel 2.6.8 rc3
    linux linux kernel 2.6.8 rc2
    linux linux kernel 2.6.8 rc1
    linux linux kernel 2.6.7 rc3
    linux linux kernel 2.6.7 rc2
    linux linux kernel 2.6.7 rc1
    linux linux kernel 2.6.6 rc3
    linux linux kernel 2.6.6 rc2
    linux linux kernel 2.6.5 rc3
    linux linux kernel 2.6.5 rc2
    linux linux kernel 2.6.5 rc1
    linux linux kernel 2.6.4 rc3
    linux linux kernel 2.6.4 rc2
    linux linux kernel 2.6.4 rc1
    linux linux kernel 2.6.3 rc4
    linux linux kernel 2.6.3 rc3
    linux linux kernel 2.6.3 rc2
    linux linux kernel 2.6.2 rc3
    linux linux kernel 2.6.2 rc2
    linux linux kernel 2.6.2 rc1
    linux linux kernel 2.6.1 rc3
    linux linux kernel 2.6.1 rc2
    linux linux kernel 2.6.1 rc1
    linux linux kernel 2.6.11 rc5
    linux linux kernel 2.6.11 rc4
    linux linux kernel 2.6.11 rc3
    linux linux kernel 2.6.11 rc2
    linux linux kernel 2.6.10 rc3
    linux linux kernel 2.6.10 rc2
    linux linux kernel 2.6.10 rc1
    linux linux kernel 2.6.3 rc1
    linux linux kernel 2.6.0
    linux linux kernel 2.6.1
    linux linux kernel 2.6.10
    linux linux kernel 2.6.11
    linux linux kernel 2.6.11.1
    linux linux kernel 2.6.11.2
    linux linux kernel 2.6.11.3
    linux linux kernel 2.6.11.4
    linux linux kernel 2.6.11.5
    linux linux kernel 2.6.3
    linux linux kernel 2.6.4
    linux linux kernel 2.6.5
    linux linux kernel 2.6.6
    linux linux kernel 2.6.7
    linux linux kernel 2.6.8
    linux linux kernel 2.6.8.1
    linux linux kernel 2.6.9
    suse linux enterprise server 8
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    suse suse linux 8.2
    suse suse linux 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux 10.0
    suse suse linux 9.1
    redhat enterprise linux 3
    suse suse linux 9.2
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell open enterprise server *
    mandrakesoft mandrake multi network firewall 2.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1
    novell open enterprise server *
    suse suse linux 9.3