CVE-2005-3055

CVSS V2 Low 2.1 CVSS V3 None
Description
Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
Overview
  • CVE ID
  • CVE-2005-3055
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2005-09-26T19:03:00
  • Last Modified Date
  • 2018-10-19T15:34:30
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 2.1
  • Severity
  • LOW
  • Exploitability Score
  • 3.9
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://www.securityfocus.com/advisories/9806 Third Party Advisory VDB Entry
http://secunia.com/advisories/17917 Permissions Required Third Party Advisory
http://www.securityfocus.com/bid/14955 Third Party Advisory VDB Entry
http://secunia.com/advisories/17918 Permissions Required Third Party Advisory
http://www.debian.org/security/2006/dsa-1017 Third Party Advisory
http://secunia.com/advisories/17826 Permissions Required Third Party Advisory
http://secunia.com/advisories/19374 Permissions Required Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0579.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0580.html Not Applicable
http://secunia.com/advisories/21035 Permissions Required Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0437.html Not Applicable
http://secunia.com/advisories/21136 Permissions Required Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0575.html Not Applicable
http://secunia.com/advisories/21465 Permissions Required Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://secunia.com/advisories/21983 Permissions Required Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm Third Party Advisory
http://secunia.com/advisories/22417 Permissions Required Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 Broken Link
http://www.vupen.com/english/advisories/2005/1863 Broken Link
http://marc.info/?l=linux-kernel&m=112766129313883 Mailing List
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472
https://usn.ubuntu.com/219-1/
http://www.securityfocus.com/archive/1/419522/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:05:06 Added to TrackCVE