4.6

CVE-2005-2555

Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DebianDebian Linux Version3.1
LinuxLinux Kernel Version2.6.0
LinuxLinux Kernel Version2.6.0 Updatetest1
LinuxLinux Kernel Version2.6.0 Updatetest10
LinuxLinux Kernel Version2.6.0 Updatetest11
LinuxLinux Kernel Version2.6.0 Updatetest2
LinuxLinux Kernel Version2.6.0 Updatetest3
LinuxLinux Kernel Version2.6.0 Updatetest4
LinuxLinux Kernel Version2.6.0 Updatetest5
LinuxLinux Kernel Version2.6.0 Updatetest6
LinuxLinux Kernel Version2.6.0 Updatetest7
LinuxLinux Kernel Version2.6.0 Updatetest8
LinuxLinux Kernel Version2.6.0 Updatetest9
LinuxLinux Kernel Version2.6.1
LinuxLinux Kernel Version2.6.1 Updaterc1
LinuxLinux Kernel Version2.6.1 Updaterc2
LinuxLinux Kernel Version2.6.2
LinuxLinux Kernel Version2.6.3
LinuxLinux Kernel Version2.6.4
LinuxLinux Kernel Version2.6.5
LinuxLinux Kernel Version2.6.6
LinuxLinux Kernel Version2.6.6 Updaterc1
LinuxLinux Kernel Version2.6.7
LinuxLinux Kernel Version2.6.7 Updaterc1
LinuxLinux Kernel Version2.6.8
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6.8.1
LinuxLinux Kernel Version2.6.8.1.5
LinuxLinux Kernel Version2.6.8.1.5 Edition386
LinuxLinux Kernel Version2.6.8.1.5 Edition686
LinuxLinux Kernel Version2.6.8.1.5 Edition686_smp
LinuxLinux Kernel Version2.6.8.1.5 Editionamd64
LinuxLinux Kernel Version2.6.8.1.5 Editionamd64_k8
LinuxLinux Kernel Version2.6.8.1.5 Editionamd64_k8_smp
LinuxLinux Kernel Version2.6.8.1.5 Editionamd64_xeon
LinuxLinux Kernel Version2.6.8.1.5 Editionk7
LinuxLinux Kernel Version2.6.8.1.5 Editionk7_smp
LinuxLinux Kernel Version2.6.8.1.5 Editionpower3
LinuxLinux Kernel Version2.6.8.1.5 Editionpower3_smp
LinuxLinux Kernel Version2.6.8.1.5 Editionpower4
LinuxLinux Kernel Version2.6.8.1.5 Editionpower4_smp
LinuxLinux Kernel Version2.6.8.1.5 Editionpowerpc
LinuxLinux Kernel Version2.6.8.1.5 Editionpowerpc_smp
LinuxLinux Kernel Version2.6.9 Update2.6.20
LinuxLinux Kernel Version2.6.10
LinuxLinux Kernel Version2.6.10 Updaterc2
LinuxLinux Kernel Version2.6.11
LinuxLinux Kernel Version2.6.11 Updaterc1
LinuxLinux Kernel Version2.6.11 Updaterc2
LinuxLinux Kernel Version2.6.11 Updaterc3
LinuxLinux Kernel Version2.6.11 Updaterc4
LinuxLinux Kernel Version2.6.11.1
LinuxLinux Kernel Version2.6.11.2
LinuxLinux Kernel Version2.6.11.3
LinuxLinux Kernel Version2.6.11.4
LinuxLinux Kernel Version2.6.11.5
LinuxLinux Kernel Version2.6.11.6
LinuxLinux Kernel Version2.6.11.7
LinuxLinux Kernel Version2.6.11.8
LinuxLinux Kernel Version2.6.11_rc1_bk6
LinuxLinux Kernel Version2.6.12 Updaterc1
LinuxLinux Kernel Version2.6.12 Updaterc4
LinuxLinux Kernel Version2.6_test9_cvs
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.235
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
http://secunia.com/advisories/17002
Third Party Advisory
Permissions Required
http://secunia.com/advisories/17826
Third Party Advisory
Permissions Required
http://secunia.com/advisories/19374
Third Party Advisory
Permissions Required
http://secunia.com/advisories/19369
Third Party Advisory
Permissions Required
http://secunia.com/advisories/17073
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/14609
Third Party Advisory
VDB Entry