CVE-2005-0136
Published Dec 31, 2005
Last updated 6 years ago
Overview
- Description
- The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F90242EF-048B-4539-AA41-87AA84875A9E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C4E9325-2A70-4E15-9AAF-5588BF218055" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01402A85-B681-4DE0-B7BB-F52567DA29E2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70D1E088-5A9B-4CBF-A4FF-969201942CCC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27B3F220-7FE0-4D47-918B-C9CBFAD23808" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "813C1C54-697D-4170-8202-E07FF578815A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51403992-077A-4F6F-8722-DAAD30489DB3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD22CEB2-838D-4D03-B1D0-2735CA5CA7EB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B066E6A-B150-4D5F-8263-F955EB366806" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D4A2EB4-9F3C-4FEC-96FA-339C6FBD8D6A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A58C85C-BF31-4EDB-9CEA-1F31EA0AEC58" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72587FF5-B82D-42DE-A35B-0ECA76C37D54" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "013D2D76-AFAD-4479-B814-8597D8F51B7C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86F9C61A-913C-42BA-BD16-BF82F75AA84B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6E51493-8AE7-4F18-85BD-D0444A297C1B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD68B4B3-CCF4-4A64-8C67-F549CC905A06" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9350C90-D7A3-4DFF-A574-D079A4DCC453" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A27FA94-0483-4DD7-A2C4-9FA246526243" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076DD5-3110-4C81-BD0B-3B2A4D75AAE7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC53528-A67F-42DF-B8DA-778A65893F9D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC106BDA-2EA4-41A2-AA01-6352A5C255B5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB515243-7519-4CA4-9267-D9A6798CBC49" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B672E1B6-E8E9-473F-853F-906EA56D712E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F727CD3-D3C2-4648-9EC5-092DF3F73B13" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B130EB7-A951-4717-A906-E2F602F7B69F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1765065-ABE5-478C-9ACC-EFFA8E4A7043" } ], "operator": "OR" } ] } ]