CVE-2005-3055
Published Sep 26, 2005
Last updated 6 years ago
Overview
- Description
- Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F90242EF-048B-4539-AA41-87AA84875A9E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C4E9325-2A70-4E15-9AAF-5588BF218055" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01402A85-B681-4DE0-B7BB-F52567DA29E2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC53528-A67F-42DF-B8DA-778A65893F9D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B130EB7-A951-4717-A906-E2F602F7B69F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2422569B-02ED-4028-83D8-D778657596B7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E66E4653-1A55-4827-888B-E0776E32ED28" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C8994CB-7F94-43FB-8B84-06AEBB34EAE0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "169446DE-67F8-4738-91FE-ED8058118F80" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93F0834D-C5EA-4C96-8D6C-3123ECF78F8C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D9F976B-1328-40FE-A1F2-C1DF3F836604" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10E1B011-8D20-448E-9DD5-023DD30D1FE1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A29A4BC-0442-458E-A874-BF0D0F2870FC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04F25DE0-CA8E-4F57-87A5-C30D89CC9E44" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F87F764B-4097-44FA-B96E-A5DA75E31F7B" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" } ], "operator": "OR" } ] } ]