CVE-2005-3257

The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using loadkeys.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 Exploit Vendor Advisory
http://rhn.redhat.com/errata/RHBA-2007-0304.html
http://secunia.com/advisories/17226 Vendor Advisory
http://secunia.com/advisories/17826 Vendor Advisory
http://secunia.com/advisories/17995 Vendor Advisory
http://secunia.com/advisories/18203 Vendor Advisory
http://secunia.com/advisories/19185 Vendor Advisory
http://secunia.com/advisories/19369 Vendor Advisory
http://secunia.com/advisories/19374 Vendor Advisory
http://www.debian.org/security/2006/dsa-1017
http://www.debian.org/security/2006/dsa-1018
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
http://www.securityfocus.com/bid/15122
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10615
https://usn.ubuntu.com/231-1/
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 Exploit Vendor Advisory
http://rhn.redhat.com/errata/RHBA-2007-0304.html
http://secunia.com/advisories/17226 Vendor Advisory
http://secunia.com/advisories/17826 Vendor Advisory
http://secunia.com/advisories/17995 Vendor Advisory
http://secunia.com/advisories/18203 Vendor Advisory
http://secunia.com/advisories/19185 Vendor Advisory
http://secunia.com/advisories/19369 Vendor Advisory
http://secunia.com/advisories/19374 Vendor Advisory
http://www.debian.org/security/2006/dsa-1017
http://www.debian.org/security/2006/dsa-1018
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
http://www.securityfocus.com/bid/15122
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10615
https://usn.ubuntu.com/231-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 - Exploit, Vendor Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 - Exploit, Vendor Advisory
References () http://rhn.redhat.com/errata/RHBA-2007-0304.html - () http://rhn.redhat.com/errata/RHBA-2007-0304.html -
References () http://secunia.com/advisories/17226 - Vendor Advisory () http://secunia.com/advisories/17226 - Vendor Advisory
References () http://secunia.com/advisories/17826 - Vendor Advisory () http://secunia.com/advisories/17826 - Vendor Advisory
References () http://secunia.com/advisories/17995 - Vendor Advisory () http://secunia.com/advisories/17995 - Vendor Advisory
References () http://secunia.com/advisories/18203 - Vendor Advisory () http://secunia.com/advisories/18203 - Vendor Advisory
References () http://secunia.com/advisories/19185 - Vendor Advisory () http://secunia.com/advisories/19185 - Vendor Advisory
References () http://secunia.com/advisories/19369 - Vendor Advisory () http://secunia.com/advisories/19369 - Vendor Advisory
References () http://secunia.com/advisories/19374 - Vendor Advisory () http://secunia.com/advisories/19374 - Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1017 - () http://www.debian.org/security/2006/dsa-1017 -
References () http://www.debian.org/security/2006/dsa-1018 - () http://www.debian.org/security/2006/dsa-1018 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 -
References () http://www.securityfocus.com/bid/15122 - () http://www.securityfocus.com/bid/15122 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10615 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10615 -
References () https://usn.ubuntu.com/231-1/ - () https://usn.ubuntu.com/231-1/ -

Information

Published : 2005-10-18 22:02

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3257

Mitre link : CVE-2005-3257

CVE.ORG link : CVE-2005-3257


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-264

Permissions, Privileges, and Access Controls