Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2005-1768 |
CWE-ID | CWE-362 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU95472
Risk: Low
CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2005-1768
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
MitigationInstall update from vendor's repository.
Vulnerable software versionsLinux kernel: All versions
External linkshttp:ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
http://marc.info/?l=bugtraq&m=112110120216116&w=2
http://secunia.com/advisories/15980
http://secunia.com/advisories/17002
http://secunia.com/advisories/18059
http://secunia.com/advisories/19185
http://secunia.com/advisories/19607
http://securitytracker.com/id?1014442
http://www.debian.org/security/2005/dsa-921
http://www.novell.com/linux/security/advisories/2005_44_kernel.html
http://www.redhat.com/support/errata/RHSA-2005-551.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.securityfocus.com/bid/14205
http://www.suresec.org/advisories/adv4.pdf
http://www.vupen.com/english/advisories/2005/1878
http://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11117
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.