2.1

CVE-2005-0003

The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.

Data is provided by the National Vulnerability Database (NVD)
AvayaMn100
AvayaS8710 Versionr2.0.0
AvayaS8710 Versionr2.0.1
LinuxLinux Kernel Version2.4.0
LinuxLinux Kernel Version2.4.0 Updatetest1
LinuxLinux Kernel Version2.4.0 Updatetest10
LinuxLinux Kernel Version2.4.0 Updatetest11
LinuxLinux Kernel Version2.4.0 Updatetest12
LinuxLinux Kernel Version2.4.0 Updatetest2
LinuxLinux Kernel Version2.4.0 Updatetest3
LinuxLinux Kernel Version2.4.0 Updatetest4
LinuxLinux Kernel Version2.4.0 Updatetest5
LinuxLinux Kernel Version2.4.0 Updatetest6
LinuxLinux Kernel Version2.4.0 Updatetest7
LinuxLinux Kernel Version2.4.0 Updatetest8
LinuxLinux Kernel Version2.4.0 Updatetest9
LinuxLinux Kernel Version2.4.1
LinuxLinux Kernel Version2.4.2
LinuxLinux Kernel Version2.4.3
LinuxLinux Kernel Version2.4.4
LinuxLinux Kernel Version2.4.5
LinuxLinux Kernel Version2.4.6
LinuxLinux Kernel Version2.4.7
LinuxLinux Kernel Version2.4.8
LinuxLinux Kernel Version2.4.9
LinuxLinux Kernel Version2.4.10
LinuxLinux Kernel Version2.4.11
LinuxLinux Kernel Version2.4.12
LinuxLinux Kernel Version2.4.13
LinuxLinux Kernel Version2.4.14
LinuxLinux Kernel Version2.4.15
LinuxLinux Kernel Version2.4.16
LinuxLinux Kernel Version2.4.17
LinuxLinux Kernel Version2.4.18
LinuxLinux Kernel Version2.4.18 Editionx86
LinuxLinux Kernel Version2.4.18 Updatepre1
LinuxLinux Kernel Version2.4.18 Updatepre2
LinuxLinux Kernel Version2.4.18 Updatepre3
LinuxLinux Kernel Version2.4.18 Updatepre4
LinuxLinux Kernel Version2.4.18 Updatepre5
LinuxLinux Kernel Version2.4.18 Updatepre6
LinuxLinux Kernel Version2.4.18 Updatepre7
LinuxLinux Kernel Version2.4.18 Updatepre8
LinuxLinux Kernel Version2.4.19
LinuxLinux Kernel Version2.4.19 Updatepre1
LinuxLinux Kernel Version2.4.19 Updatepre2
LinuxLinux Kernel Version2.4.19 Updatepre3
LinuxLinux Kernel Version2.4.19 Updatepre4
LinuxLinux Kernel Version2.4.19 Updatepre5
LinuxLinux Kernel Version2.4.19 Updatepre6
LinuxLinux Kernel Version2.4.20
LinuxLinux Kernel Version2.4.21
LinuxLinux Kernel Version2.4.21 Updatepre1
LinuxLinux Kernel Version2.4.21 Updatepre4
LinuxLinux Kernel Version2.4.21 Updatepre7
LinuxLinux Kernel Version2.4.22
LinuxLinux Kernel Version2.4.23
LinuxLinux Kernel Version2.4.23 Updatepre9
LinuxLinux Kernel Version2.4.23_ow2
LinuxLinux Kernel Version2.4.24
LinuxLinux Kernel Version2.4.24_ow1
LinuxLinux Kernel Version2.4.25
LinuxLinux Kernel Version2.4.26
LinuxLinux Kernel Version2.4.27
LinuxLinux Kernel Version2.4.27 Updatepre1
LinuxLinux Kernel Version2.4.27 Updatepre2
LinuxLinux Kernel Version2.4.27 Updatepre3
LinuxLinux Kernel Version2.4.27 Updatepre4
LinuxLinux Kernel Version2.4.27 Updatepre5
LinuxLinux Kernel Version2.4.28
LinuxLinux Kernel Version2.4.29 Updaterc1
LinuxLinux Kernel Version2.4.29 Updaterc2
MandrakesoftMandrake Linux Version9.2
MandrakesoftMandrake Linux Version9.2 Editionamd64
MandrakesoftMandrake Linux Version10.0
MandrakesoftMandrake Linux Version10.0 Editionamd64
MandrakesoftMandrake Linux Version10.1
MandrakesoftMandrake Linux Version10.1 Editionx86_64
MandrakesoftMandrake Linux Corporate Server Version2.1 Editionx86_64
RedhatEnterprise Linux Version3.0 Editionadvanced_servers
RedhatEnterprise Linux Version3.0 Editionenterprise_server
RedhatEnterprise Linux Version3.0 Editionworkstation
AvayaIntuity Audix Editionlx
AvayaS8300 Versionr2.0.0
AvayaS8300 Versionr2.0.1
AvayaS8500 Versionr2.0.0
AvayaS8500 Versionr2.0.1
AvayaS8700 Versionr2.0.0
AvayaS8700 Versionr2.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.206
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:N/I:N/A:P