CVE-2005-0977
Published May 2, 2005
Last updated a year ago
Overview
- Description
- The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel 2.6 does not properly verify the address argument, which allows local users to cause a denial of service (kernel crash) via an invalid address.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27B3F220-7FE0-4D47-918B-C9CBFAD23808" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "813C1C54-697D-4170-8202-E07FF578815A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51403992-077A-4F6F-8722-DAAD30489DB3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD22CEB2-838D-4D03-B1D0-2735CA5CA7EB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B066E6A-B150-4D5F-8263-F955EB366806" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D4A2EB4-9F3C-4FEC-96FA-339C6FBD8D6A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A58C85C-BF31-4EDB-9CEA-1F31EA0AEC58" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72587FF5-B82D-42DE-A35B-0ECA76C37D54" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "013D2D76-AFAD-4479-B814-8597D8F51B7C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86F9C61A-913C-42BA-BD16-BF82F75AA84B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6E51493-8AE7-4F18-85BD-D0444A297C1B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD68B4B3-CCF4-4A64-8C67-F549CC905A06" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9350C90-D7A3-4DFF-A574-D079A4DCC453" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A27FA94-0483-4DD7-A2C4-9FA246526243" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076DD5-3110-4C81-BD0B-3B2A4D75AAE7" } ], "operator": "OR" } ] } ]