National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2005-4881 Detail

Description

The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.

Source:  MITRE      Last Modified:  10/19/2009

Quick Info

CVE Dictionary Entry:
CVE-2005-4881
Original release date:
10/19/2009
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.9 MEDIUM
Vector:
(AV:L/AC:L/Au:N/C:C/I:N/A:N) (legend)
Impact Subscore:
6.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

Vendor Statements (disclaimer)

Official Statement from Red Hat (10/22/2009)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2005-4881 This issue has been rated as having moderate security impact. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, and Red Hat Enterprise MRG. It affects Red Hat Enterprise Linux 3, and 4. It was addressed in Red Hat Enterprise Linux 4 via: https://rhn.redhat.com/errata/RHSA-2009-1522.html This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed. For further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=0f3f2328f63c521fe4b435f148687452f98b2349 Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=0f3f2328f63c521fe4b435f148687452f98b2349
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=30e744716c4a6cc4e8ecaaddf68f20057c03dc8d Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=30e744716c4a6cc4e8ecaaddf68f20057c03dc8d
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=3408cce0c2f380884070896420ca566704452fb5 Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=3408cce0c2f380884070896420ca566704452fb5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a47077a0b5aa2649751c46e7a27884e6686ccbf Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a47077a0b5aa2649751c46e7a27884e6686ccbf
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8 Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b3563c4fbff906991a1b4ef4609f99cca2a0de6a Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b3563c4fbff906991a1b4ef4609f99cca2a0de6a
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html External Source SUSE SUSE-SA:2009:064
http://marc.info/?l=git-commits-head&m=112002138324380 Patch External Source MLIST [bk-commits-head] 20050629 [NETLINK]: Missing initializations in dumped data
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6 Vendor Advisory External Source CONFIRM http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.13/ChangeLog-2.6.13-rc1 Patch; Vendor Advisory External Source CONFIRM http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.13/ChangeLog-2.6.13-rc1
http://www.openwall.com/lists/oss-security/2009/09/05/2 Patch External Source MLIST [oss-security] 20090905 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/06/2 Patch External Source MLIST [oss-security] 20090906 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/07/2 Patch External Source MLIST [oss-security] 20090907 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/17/1 Patch External Source MLIST [oss-security] 20090916 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/17/9 Patch External Source MLIST [oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.redhat.com/support/errata/RHSA-2009-1522.html External Source REDHAT RHSA-2009:1522
https://bugzilla.redhat.com/show_bug.cgi?id=521601 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=521601
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11744 External Source OVAL oval:org.mitre.oval:def:11744

References to Check Content

Identifier:
oval:org.mitre.oval:def:11744
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11744

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre1:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre2:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre3:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre4:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre5:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.34.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.35.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.35.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.35.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.35.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.36.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.37.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.37.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.37.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.37.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*
Configuration 2
OR
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 3 change records found - show changes