CVE-2005-4639

Buffer overflow in the CA-driver (dst_ca.c) for TwinHan DST Frontend/Card in Linux kernel 2.6.12 and other versions before 2.6.15 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by "reading more than 8 bytes into an 8 byte long array".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://secunia.com/advisories/18216 - Patch, Vendor Advisory () http://secunia.com/advisories/18216 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18527 - Patch, Vendor Advisory () http://secunia.com/advisories/18527 - Patch, Vendor Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 - () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:040 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:040 -
References () http://www.securityfocus.com/bid/16142 - Patch () http://www.securityfocus.com/bid/16142 - Patch
References () http://www.vupen.com/english/advisories/2006/0035 - () http://www.vupen.com/english/advisories/2006/0035 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43323 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43323 -
References () https://usn.ubuntu.com/244-1/ - () https://usn.ubuntu.com/244-1/ -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4639

Mitre link : CVE-2005-4639

CVE.ORG link : CVE-2005-4639


JSON object : View

Products Affected

linux

  • linux_kernel