Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-2099

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2005-2099
Last Modified 07 Mar 2011 12:00:00
Published 23 Aug 2005 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-2099

Summary

The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.

Vulnerable Systems

Operating System

  • Linux Kernel 2.6 Test9 Cvs

  • Linux Kernel 2.6.0

  • Linux Kernel 2.6.1

  • Linux Kernel 2.6.10

  • Linux Kernel 2.6.11

  • Linux Kernel 2.6.11 Rc1 Bk6

  • Linux Kernel 2.6.11.1

  • Linux Kernel 2.6.11.2

  • Linux Kernel 2.6.11.3

  • Linux Kernel 2.6.11.4

  • Linux Kernel 2.6.11.5

  • Linux Kernel 2.6.11.6

  • Linux Kernel 2.6.11.7

  • Linux Kernel 2.6.11.8

  • Linux Kernel 2.6.12

  • Linux Kernel 2.6.2

  • Linux Kernel 2.6.3

  • Linux Kernel 2.6.4

  • Linux Kernel 2.6.5

  • Linux Kernel 2.6.6

  • Linux Kernel 2.6.7

  • Linux Kernel 2.6.8

  • Linux Kernel 2.6.8.1

  • Linux Kernel 2.6.8.1.5

  • Linux Kernel 2.6.9


References

SECUNIA - 16355

UBUNTU - USN-169-1

BID - 14517

FEDORA - FLSA:157459-3

REDHAT - RHSA-2005:514

MANDRAKE - MDKSA-2005:220

SECTRACK - 1014644

SECUNIA - 17073

CONFIRM - http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5


Last Updated: 27 May 2016 10:40:24