National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2005-3274 Detail

Description

Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.

Source:  MITRE
Description Last Modified:  10/20/2005

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 1.2 LOW
Vector: (AV:L/AC:H/Au:N/C:N/I:N/A:P) (V2 legend)
Impact Subscore: 2.9
Exploitability Subscore: 1.9


Access Vector (AV): Local
Access Complexity (AC): High
Authentication (AU): None
Confidentiality (C): None
Integrity (I): None
Availability (A): Partial
Additional Information:
Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://www.debian.org/security/2005/dsa-922
http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=e684f066dff5628bb61ad1912de6e8058b5b4c7d Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.securityfocus.com/bid/15528
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
https://usn.ubuntu.com/219-1/

References to Check Content

Identifier:
oval:org.mitre.oval:def:11723
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11723

Technical Details

Vulnerability Type (View All)

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
 cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
     Show Matching CPE(s)


Change History

6 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2005-3274
NVD Published Date:
10/20/2005
NVD Last Modified:
10/19/2018