Vulnerability Name: | CVE-2005-0757 (CCN-21808) | ||||||||||||||||||||
Assigned: | 2005-05-18 | ||||||||||||||||||||
Published: | 2005-05-18 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled. | ||||||||||||||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-0757 Source: MITRE Type: CNA CVE-2005-2801 Source: CCN Type: RHSA-2005-294 Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5 Source: CCN Type: RHSA-2005-514 Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2 Source: CCN Type: RHSA-2006-0144 Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7 Source: SECUNIA Type: UNKNOWN 18056 Source: SECUNIA Type: UNKNOWN 18059 Source: DEBIAN Type: UNKNOWN DSA-921 Source: DEBIAN Type: UNKNOWN DSA-922 Source: DEBIAN Type: DSA-921 kernel-source-2.4.27 -- several vulnerabilities Source: DEBIAN Type: DSA-922 kernel-source-2.6.8 -- several vulnerabilities Source: REDHAT Type: Patch, Vendor Advisory RHSA-2005:294 Source: BID Type: UNKNOWN 13680 Source: CCN Type: BID-13680 Linux Kernel 64 Bit EXT3 Filesystem Extended Attribute Denial Of Service Vulnerability Source: CCN Type: BID-14793 Linux Kernel EXT2/EXT3 File System Access Control Bypass Vulnerability Source: CCN Type: USN-178-1 Linux kernel vulnerabilities Source: XF Type: UNKNOWN redhat-xattr-dos(21808) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11406 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |