Vulnerability Name: CVE-2005-3055 (CCN-23773) Assigned: 2005-09-25 Published: 2005-09-25 Updated: 2018-10-19 Summary: Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference. CVSS v3 Severity: 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-20 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-3055 Source: MLIST Type: Mailing List[linux-kernel] 20050925 [BUG/PATCH/RFC] Oops while completing async USB via usbdevio Source: CCN Type: linux-kernel Mailing List, 2005-09-25 15:13:30[BUG/PATCH/RFC] Oops while completing async USB via usbdevio Source: CCN Type: RHSA-2006-0437Updated kernel packages for Red Hat Enterprise Linux 3 Update 8 Source: CCN Type: RHSA-2006-0575Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4 Source: CCN Type: RHSA-2006-0579kernel security update Source: CCN Type: RHSA-2006-0580kernel security update Source: SECUNIA Type: Permissions Required, Third Party Advisory17826 Source: SECUNIA Type: Permissions Required, Third Party Advisory17917 Source: SECUNIA Type: Permissions Required, Third Party Advisory17918 Source: SECUNIA Type: Permissions Required, Third Party Advisory19374 Source: SECUNIA Type: Permissions Required, Third Party Advisory21035 Source: SECUNIA Type: Permissions Required, Third Party Advisory21136 Source: SECUNIA Type: Permissions Required, Third Party Advisory21465 Source: CCN Type: SA21983Avaya Products Linux Kernel Multiple Vulnerabilities Source: SECUNIA Type: Permissions Required, Third Party Advisory21983 Source: CCN Type: SA22417Avaya Products Linux Kernel Multiple Vulnerabilities Source: SECUNIA Type: Permissions Required, Third Party Advisory22417 Source: CCN Type: ASA-2006-143kernel security update (RHSA-2006-0580) Source: CONFIRM Type: UNKNOWNhttp://support.avaya.com/elmodocs2/security/ASA-2006-180.htm Source: CCN Type: ASA-2006-180Updated kernel packages for Red Hat Enterprise Linux 3 Update 8 (RHSA-2006-0437) Source: CONFIRM Type: Third Party Advisoryhttp://support.avaya.com/elmodocs2/security/ASA-2006-200.htm Source: CCN Type: ASA-2006-200Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4 (RHSA-2006-0575) Source: DEBIAN Type: Third Party AdvisoryDSA-1017 Source: DEBIAN Type: DSA-1017kernel-source-2.6.8 -- several vulnerabilities Source: CCN Type: The The Linux Kernel Archives Web pageThe Linux Kernel Archives Source: MANDRAKE Type: Broken LinkMDKSA-2005:218 Source: MANDRAKE Type: UNKNOWNMDKSA-2005:219 Source: MANDRAKE Type: UNKNOWNMDKSA-2005:220 Source: MANDRIVA Type: Broken LinkMDKSA-2005:235 Source: REDHAT Type: Not ApplicableRHSA-2006:0437 Source: REDHAT Type: Not ApplicableRHSA-2006:0575 Source: REDHAT Type: Not ApplicableRHSA-2006:0579 Source: REDHAT Type: Not ApplicableRHSA-2006:0580 Source: SUSE Type: Third Party Advisory, VDB EntrySUSE-SA:2005:067 Source: SUSE Type: UNKNOWNSUSE-SA:2005:068 Source: BID Type: Third Party Advisory, VDB Entry14955 Source: CCN Type: BID-14955Linux Kernel USB Subsystem Local Denial Of Service Vulnerability Source: CCN Type: USN-219-1Linux kernel vulnerabilities Source: VUPEN Type: Broken LinkADV-2005-1863 Source: XF Type: UNKNOWNlinux-usb-urb-dos(23773) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:9472 Source: UBUNTU Type: UNKNOWNUSN-219-1 Source: SUSE Type: SUSE-SA:2005:067SUSE Linux 10.0 Kernel: various security problems Source: SUSE Type: SUSE-SA:2005:068Linux kernel: various security problems Vulnerable Configuration: Configuration 1 :cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:* Configuration 2 :cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:* AND cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
linux linux kernel 2.6.8
linux linux kernel 2.6.8 rc1
linux linux kernel 2.6.8 rc2
linux linux kernel 2.6.8 rc3
linux linux kernel 2.6.9 2.6.20
linux linux kernel 2.6.10
linux linux kernel 2.6.10 rc2
linux linux kernel 2.6.11
linux linux kernel 2.6.11 rc2
linux linux kernel 2.6.11 rc3
linux linux kernel 2.6.11 rc4
linux linux kernel 2.6.11.5
linux linux kernel 2.6.11.6
linux linux kernel 2.6.11.7
linux linux kernel 2.6.11.8
linux linux kernel 2.6.11.11
linux linux kernel 2.6.12 rc1
linux linux kernel 2.6.12 rc4
linux linux kernel 2.6.12 rc5
linux linux kernel 2.6.12.1
linux linux kernel 2.6.12.2
linux linux kernel 2.6.12.3
linux linux kernel 2.6.12.4
linux linux kernel 2.6.12.5
linux linux kernel 2.6.13
linux linux kernel 2.6.13 rc1
linux linux kernel 2.6.13 rc4
linux linux kernel 2.6.13 rc6
linux linux kernel 2.6.13 rc7
linux linux kernel 2.6.13.1
linux linux kernel 2.6.13.2
linux linux kernel 2.6.14 rc1
linux linux kernel 2.6.14 rc2
debian debian linux 3.1
linux linux kernel 2.6.8 rc3
linux linux kernel 2.6.8 rc2
linux linux kernel 2.6.8 rc1
linux linux kernel 2.6.14 rc2
linux linux kernel 2.6.14 rc1
linux linux kernel 2.6.13 rc7
linux linux kernel 2.6.13 rc6
linux linux kernel 2.6.13 rc4
linux linux kernel 2.6.13 rc1
linux linux kernel 2.6.12 rc5
linux linux kernel 2.6.12 rc4
linux linux kernel 2.6.12 rc1
linux linux kernel 2.6.11 rc4
linux linux kernel 2.6.11 rc3
linux linux kernel 2.6.11 rc2
linux linux kernel 2.6.10 rc2
linux linux kernel 2.6.10
linux linux kernel 2.6.11
linux linux kernel 2.6.11.11
linux linux kernel 2.6.11.5
linux linux kernel 2.6.11.6
linux linux kernel 2.6.11.7
linux linux kernel 2.6.11.8
linux linux kernel 2.6.12.1
linux linux kernel 2.6.12.2
linux linux kernel 2.6.12.3
linux linux kernel 2.6.12.4
linux linux kernel 2.6.12.5
linux linux kernel 2.6.13
linux linux kernel 2.6.13.1
linux linux kernel 2.6.13.2
linux linux kernel 2.6.8
linux linux kernel 2.6.9
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
mandrakesoft mandrake multi network firewall 2.0
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
suse suse linux 9.3