CVE-2005-2490

Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
References
Link Resource
http://marc.info/?l=bugtraq&m=112690609622266&w=2
http://secunia.com/advisories/16747/ Patch Vendor Advisory
http://secunia.com/advisories/17002
http://secunia.com/advisories/17073
http://secunia.com/advisories/17826
http://secunia.com/advisories/17918
http://secunia.com/advisories/19374
http://www.debian.org/security/2006/dsa-1017
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
http://www.redhat.com/support/errata/RHSA-2005-514.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.securityfocus.com/archive/1/419522/100/0/threaded
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
http://www.securityfocus.com/bid/14785
http://www.ubuntu.com/usn/usn-178-1 Vendor Advisory
http://www.vupen.com/english/advisories/2005/1878
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22217
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481
http://marc.info/?l=bugtraq&m=112690609622266&w=2
http://secunia.com/advisories/16747/ Patch Vendor Advisory
http://secunia.com/advisories/17002
http://secunia.com/advisories/17073
http://secunia.com/advisories/17826
http://secunia.com/advisories/17918
http://secunia.com/advisories/19374
http://www.debian.org/security/2006/dsa-1017
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
http://www.redhat.com/support/errata/RHSA-2005-514.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.securityfocus.com/archive/1/419522/100/0/threaded
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
http://www.securityfocus.com/bid/14785
http://www.ubuntu.com/usn/usn-178-1 Vendor Advisory
http://www.vupen.com/english/advisories/2005/1878
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22217
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112690609622266&w=2 - () http://marc.info/?l=bugtraq&m=112690609622266&w=2 -
References () http://secunia.com/advisories/16747/ - Patch, Vendor Advisory () http://secunia.com/advisories/16747/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17002 - () http://secunia.com/advisories/17002 -
References () http://secunia.com/advisories/17073 - () http://secunia.com/advisories/17073 -
References () http://secunia.com/advisories/17826 - () http://secunia.com/advisories/17826 -
References () http://secunia.com/advisories/17918 - () http://secunia.com/advisories/17918 -
References () http://secunia.com/advisories/19374 - () http://secunia.com/advisories/19374 -
References () http://www.debian.org/security/2006/dsa-1017 - () http://www.debian.org/security/2006/dsa-1017 -
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 - () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 -
References () http://www.redhat.com/support/errata/RHSA-2005-514.html - () http://www.redhat.com/support/errata/RHSA-2005-514.html -
References () http://www.redhat.com/support/errata/RHSA-2005-663.html - () http://www.redhat.com/support/errata/RHSA-2005-663.html -
References () http://www.securityfocus.com/archive/1/419522/100/0/threaded - () http://www.securityfocus.com/archive/1/419522/100/0/threaded -
References () http://www.securityfocus.com/archive/1/427980/100/0/threaded - () http://www.securityfocus.com/archive/1/427980/100/0/threaded -
References () http://www.securityfocus.com/archive/1/428028/100/0/threaded - () http://www.securityfocus.com/archive/1/428028/100/0/threaded -
References () http://www.securityfocus.com/archive/1/428058/100/0/threaded - () http://www.securityfocus.com/archive/1/428058/100/0/threaded -
References () http://www.securityfocus.com/bid/14785 - () http://www.securityfocus.com/bid/14785 -
References () http://www.ubuntu.com/usn/usn-178-1 - Vendor Advisory () http://www.ubuntu.com/usn/usn-178-1 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2005/1878 - () http://www.vupen.com/english/advisories/2005/1878 -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248 - Patch () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22217 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22217 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481 -

Information

Published : 2005-09-14 19:03

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2490

Mitre link : CVE-2005-2490

CVE.ORG link : CVE-2005-2490


JSON object : View

Products Affected

linux

  • linux_kernel