Vulnerability Name: | CVE-2005-3055 (CCN-23773) |
Assigned: | 2005-09-25 |
Published: | 2005-09-25 |
Updated: | 2018-10-19 |
Summary: | Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference. |
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-20
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2005-3055
Source: MLIST Type: Mailing List [linux-kernel] 20050925 [BUG/PATCH/RFC] Oops while completing async USB via usbdevio
Source: CCN Type: linux-kernel Mailing List, 2005-09-25 15:13:30 [BUG/PATCH/RFC] Oops while completing async USB via usbdevio
Source: CCN Type: RHSA-2006-0437 Updated kernel packages for Red Hat Enterprise Linux 3 Update 8
Source: CCN Type: RHSA-2006-0575 Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4
Source: CCN Type: RHSA-2006-0579 kernel security update
Source: CCN Type: RHSA-2006-0580 kernel security update
Source: SECUNIA Type: Permissions Required, Third Party Advisory 17826
Source: SECUNIA Type: Permissions Required, Third Party Advisory 17917
Source: SECUNIA Type: Permissions Required, Third Party Advisory 17918
Source: SECUNIA Type: Permissions Required, Third Party Advisory 19374
Source: SECUNIA Type: Permissions Required, Third Party Advisory 21035
Source: SECUNIA Type: Permissions Required, Third Party Advisory 21136
Source: SECUNIA Type: Permissions Required, Third Party Advisory 21465
Source: CCN Type: SA21983 Avaya Products Linux Kernel Multiple Vulnerabilities
Source: SECUNIA Type: Permissions Required, Third Party Advisory 21983
Source: CCN Type: SA22417 Avaya Products Linux Kernel Multiple Vulnerabilities
Source: SECUNIA Type: Permissions Required, Third Party Advisory 22417
Source: CCN Type: ASA-2006-143 kernel security update (RHSA-2006-0580)
Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
Source: CCN Type: ASA-2006-180 Updated kernel packages for Red Hat Enterprise Linux 3 Update 8 (RHSA-2006-0437)
Source: CONFIRM Type: Third Party Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
Source: CCN Type: ASA-2006-200 Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4 (RHSA-2006-0575)
Source: DEBIAN Type: Third Party Advisory DSA-1017
Source: DEBIAN Type: DSA-1017 kernel-source-2.6.8 -- several vulnerabilities
Source: CCN Type: The The Linux Kernel Archives Web page The Linux Kernel Archives
Source: MANDRAKE Type: Broken Link MDKSA-2005:218
Source: MANDRAKE Type: UNKNOWN MDKSA-2005:219
Source: MANDRAKE Type: UNKNOWN MDKSA-2005:220
Source: MANDRIVA Type: Broken Link MDKSA-2005:235
Source: REDHAT Type: Not Applicable RHSA-2006:0437
Source: REDHAT Type: Not Applicable RHSA-2006:0575
Source: REDHAT Type: Not Applicable RHSA-2006:0579
Source: REDHAT Type: Not Applicable RHSA-2006:0580
Source: SUSE Type: Third Party Advisory, VDB Entry SUSE-SA:2005:067
Source: SUSE Type: UNKNOWN SUSE-SA:2005:068
Source: BID Type: Third Party Advisory, VDB Entry 14955
Source: CCN Type: BID-14955 Linux Kernel USB Subsystem Local Denial Of Service Vulnerability
Source: CCN Type: USN-219-1 Linux kernel vulnerabilities
Source: VUPEN Type: Broken Link ADV-2005-1863
Source: XF Type: UNKNOWN linux-usb-urb-dos(23773)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9472
Source: UBUNTU Type: UNKNOWN USN-219-1
Source: SUSE Type: SUSE-SA:2005:067 SUSE Linux 10.0 Kernel: various security problems
Source: SUSE Type: SUSE-SA:2005:068 Linux kernel: various security problems
|
Vulnerable Configuration: | Configuration 1: cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:* Configuration 2: cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*AND cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
linux linux kernel 2.6.8
linux linux kernel 2.6.8 rc1
linux linux kernel 2.6.8 rc2
linux linux kernel 2.6.8 rc3
linux linux kernel 2.6.9 2.6.20
linux linux kernel 2.6.10
linux linux kernel 2.6.10 rc2
linux linux kernel 2.6.11
linux linux kernel 2.6.11 rc2
linux linux kernel 2.6.11 rc3
linux linux kernel 2.6.11 rc4
linux linux kernel 2.6.11.5
linux linux kernel 2.6.11.6
linux linux kernel 2.6.11.7
linux linux kernel 2.6.11.8
linux linux kernel 2.6.11.11
linux linux kernel 2.6.12 rc1
linux linux kernel 2.6.12 rc4
linux linux kernel 2.6.12 rc5
linux linux kernel 2.6.12.1
linux linux kernel 2.6.12.2
linux linux kernel 2.6.12.3
linux linux kernel 2.6.12.4
linux linux kernel 2.6.12.5
linux linux kernel 2.6.13
linux linux kernel 2.6.13 rc1
linux linux kernel 2.6.13 rc4
linux linux kernel 2.6.13 rc6
linux linux kernel 2.6.13 rc7
linux linux kernel 2.6.13.1
linux linux kernel 2.6.13.2
linux linux kernel 2.6.14 rc1
linux linux kernel 2.6.14 rc2
debian debian linux 3.1
linux linux kernel 2.6.8 rc3
linux linux kernel 2.6.8 rc2
linux linux kernel 2.6.8 rc1
linux linux kernel 2.6.14 rc2
linux linux kernel 2.6.14 rc1
linux linux kernel 2.6.13 rc7
linux linux kernel 2.6.13 rc6
linux linux kernel 2.6.13 rc4
linux linux kernel 2.6.13 rc1
linux linux kernel 2.6.12 rc5
linux linux kernel 2.6.12 rc4
linux linux kernel 2.6.12 rc1
linux linux kernel 2.6.11 rc4
linux linux kernel 2.6.11 rc3
linux linux kernel 2.6.11 rc2
linux linux kernel 2.6.10 rc2
linux linux kernel 2.6.10
linux linux kernel 2.6.11
linux linux kernel 2.6.11.11
linux linux kernel 2.6.11.5
linux linux kernel 2.6.11.6
linux linux kernel 2.6.11.7
linux linux kernel 2.6.11.8
linux linux kernel 2.6.12.1
linux linux kernel 2.6.12.2
linux linux kernel 2.6.12.3
linux linux kernel 2.6.12.4
linux linux kernel 2.6.12.5
linux linux kernel 2.6.13
linux linux kernel 2.6.13.1
linux linux kernel 2.6.13.2
linux linux kernel 2.6.8
linux linux kernel 2.6.9
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
mandrakesoft mandrake multi network firewall 2.0
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
suse suse linux 9.3