2.1

CVE-2005-3055

Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version2.6.8
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6.9 Update2.6.20
LinuxLinux Kernel Version2.6.10
LinuxLinux Kernel Version2.6.10 Updaterc2
LinuxLinux Kernel Version2.6.11
LinuxLinux Kernel Version2.6.11 Updaterc2
LinuxLinux Kernel Version2.6.11 Updaterc3
LinuxLinux Kernel Version2.6.11 Updaterc4
LinuxLinux Kernel Version2.6.11.5
LinuxLinux Kernel Version2.6.11.6
LinuxLinux Kernel Version2.6.11.7
LinuxLinux Kernel Version2.6.11.8
LinuxLinux Kernel Version2.6.11.11
LinuxLinux Kernel Version2.6.12 Updaterc1
LinuxLinux Kernel Version2.6.12 Updaterc4
LinuxLinux Kernel Version2.6.12 Updaterc5
LinuxLinux Kernel Version2.6.12.1
LinuxLinux Kernel Version2.6.12.2
LinuxLinux Kernel Version2.6.12.3
LinuxLinux Kernel Version2.6.12.4
LinuxLinux Kernel Version2.6.12.5
LinuxLinux Kernel Version2.6.13
LinuxLinux Kernel Version2.6.13 Updaterc1
LinuxLinux Kernel Version2.6.13 Updaterc4
LinuxLinux Kernel Version2.6.13 Updaterc6
LinuxLinux Kernel Version2.6.13 Updaterc7
LinuxLinux Kernel Version2.6.13.1
LinuxLinux Kernel Version2.6.13.2
LinuxLinux Kernel Version2.6.14 Updaterc1
LinuxLinux Kernel Version2.6.14 Updaterc2
DebianDebian Linux Version3.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.23
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

http://secunia.com/advisories/17826
Third Party Advisory
Permissions Required
http://secunia.com/advisories/19374
Third Party Advisory
Permissions Required
http://secunia.com/advisories/17918
Third Party Advisory
Permissions Required
http://secunia.com/advisories/17917
Third Party Advisory
Permissions Required
http://www.securityfocus.com/advisories/9806
Third Party Advisory
VDB Entry
http://secunia.com/advisories/21035
Third Party Advisory
Permissions Required
http://secunia.com/advisories/21136
Third Party Advisory
Permissions Required
http://secunia.com/advisories/21465
Third Party Advisory
Permissions Required
http://secunia.com/advisories/21983
Third Party Advisory
Permissions Required
http://secunia.com/advisories/22417
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/14955
Third Party Advisory
VDB Entry