6.4
CVSSv2

CVE-2005-0815

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and previous versions may allow malicious users to cause a denial of service or corrupt memory via a crafted filesystem.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.0.12

linux linux kernel 2.0.13

linux linux kernel 2.0.20

linux linux kernel 2.0.21

linux linux kernel 2.0.28

linux linux kernel 2.0.29

linux linux kernel 2.0.35

linux linux kernel 2.0.36

linux linux kernel 2.0.8

linux linux kernel 2.0.9

linux linux kernel 2.2.11

linux linux kernel 2.2.12

linux linux kernel 2.2.16

linux linux kernel 2.2.17

linux linux kernel 2.2.24

linux linux kernel 2.2.25

linux linux kernel 2.2.8

linux linux kernel 2.2.9

linux linux kernel 2.3.99

linux linux kernel 2.4.0

linux linux kernel 2.4.10

linux linux kernel 2.4.11

linux linux kernel 2.4.18

linux linux kernel 2.4.19

linux linux kernel 2.4.2

linux linux kernel 2.4.20

linux linux kernel 2.4.23

linux linux kernel 2.4.23_ow2

linux linux kernel 2.4.27

linux linux kernel 2.4.3

linux linux kernel 2.4.7

linux linux kernel 2.4.8

linux linux kernel 2.5.13

linux linux kernel 2.5.14

linux linux kernel 2.5.20

linux linux kernel 2.5.21

linux linux kernel 2.5.29

linux linux kernel 2.5.3

linux linux kernel 2.0.14

linux linux kernel 2.0.15

linux linux kernel 2.0.22

linux linux kernel 2.0.23

linux linux kernel 2.0.3

linux linux kernel 2.0.30

linux linux kernel 2.0.37

linux linux kernel 2.0.38

linux linux kernel 2.0.39

linux linux kernel 2.0.9.9

linux linux kernel 2.1

linux linux kernel 2.2.13

linux linux kernel 2.2.14

linux linux kernel 2.2.18

linux linux kernel 2.2.19

linux linux kernel 2.2.2

linux linux kernel 2.2.27

linux linux kernel 2.2.3

linux linux kernel 2.3.0

linux linux kernel 2.4.12

linux linux kernel 2.4.13

linux linux kernel 2.4.21

linux linux kernel 2.4.24

linux linux kernel 2.4.24_ow1

linux linux kernel 2.4.30

linux linux kernel 2.4.9

linux linux kernel 2.5.0

linux linux kernel 2.5.15

linux linux kernel 2.5.16

linux linux kernel 2.5.22

linux linux kernel 2.5.23

linux linux kernel 2.5.24

linux linux kernel 2.5.30

linux linux kernel 2.5.31

linux linux kernel 2.5.38

linux linux kernel 2.5.39

linux linux kernel 2.5.46

linux linux kernel 2.5.47

linux linux kernel 2.5.53

linux linux kernel 2.5.54

linux linux kernel 2.5.60

linux linux kernel 2.5.61

linux linux kernel 2.5.69

linux linux kernel 2.5.7

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.0.10

linux linux kernel 2.0.11

linux linux kernel 2.0.19

linux linux kernel 2.0.2

linux linux kernel 2.0.26

linux linux kernel 2.0.27

linux linux kernel 2.0.33

linux linux kernel 2.0.34

linux linux kernel 2.0.6

linux linux kernel 2.0.7

linux linux kernel 2.2.1

linux linux kernel 2.2.10

linux linux kernel 2.2.15_pre20

linux linux kernel 2.2.22

linux linux kernel 2.2.23

linux linux kernel 2.2.6

linux linux kernel 2.2.7

linux linux kernel 2.4.1

linux linux kernel 2.4.16

linux linux kernel 2.4.17

linux linux kernel 2.4.22

linux linux kernel 2.4.29

linux linux kernel 2.4.5

linux linux kernel 2.4.6

linux linux kernel 2.5.11

linux linux kernel 2.5.12

linux linux kernel 2.5.19

linux linux kernel 2.5.2

linux linux kernel 2.5.27

linux linux kernel 2.5.28

linux linux kernel 2.5.34

linux linux kernel 2.5.35

linux linux kernel 2.5.41

linux linux kernel 2.5.42

linux linux kernel 2.5.5

linux linux kernel 2.5.50

linux linux kernel 2.5.57

linux linux kernel 2.5.58

linux linux kernel 2.5.64

linux linux kernel 2.5.65

linux linux kernel 2.5.66

linux linux kernel 2.6.10

linux linux kernel 2.6.11

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.0

linux linux kernel 2.0.1

linux linux kernel 2.0.16

linux linux kernel 2.0.17

linux linux kernel 2.0.18

linux linux kernel 2.0.24

linux linux kernel 2.0.25

linux linux kernel 2.0.31

linux linux kernel 2.0.32

linux linux kernel 2.0.4

linux linux kernel 2.0.5

linux linux kernel 2.1.89

linux linux kernel 2.2.0

linux linux kernel 2.2.15

linux linux kernel 2.2.20

linux linux kernel 2.2.21

linux linux kernel 2.2.4

linux linux kernel 2.2.5

linux linux kernel 2.4.14

linux linux kernel 2.4.15

linux linux kernel 2.4.25

linux linux kernel 2.4.26

linux linux kernel 2.4.28

linux linux kernel 2.4.31

linux linux kernel 2.4.4

linux linux kernel 2.5.1

linux linux kernel 2.5.10

linux linux kernel 2.5.17

linux linux kernel 2.5.18

linux linux kernel 2.5.25

linux linux kernel 2.5.26

linux linux kernel 2.5.32

linux linux kernel 2.5.33

linux linux kernel 2.5.4

linux linux kernel 2.5.40

linux linux kernel 2.5.48

linux linux kernel 2.5.49

linux linux kernel 2.5.55

linux linux kernel 2.5.56

linux linux kernel 2.5.62

linux linux kernel 2.5.63

linux linux kernel 2.5.8

linux linux kernel 2.5.9

linux linux kernel 2.5.36

linux linux kernel 2.5.37

linux linux kernel 2.5.43

linux linux kernel 2.5.44

linux linux kernel 2.5.45

linux linux kernel 2.5.51

linux linux kernel 2.5.52

linux linux kernel 2.5.59

linux linux kernel 2.5.6

linux linux kernel 2.5.67

linux linux kernel 2.5.68

Vendor Advisories

Mathieu Lafon discovered an information leak in the ext2 file system driver When a new directory was created, the ext2 block written to disk was not initialized, so that previous memory contents (which could contain sensitive data like passwords) became visible on the raw device This is particularly important if the target device is removable and ...
Synopsis Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6 Type/Severity Security Advisory: Important Topic Updated kernel packages are now available as part of ongoing support andmaintenance of Red Hat Enterprise Linux version 3 This is the sixthregular updateThis security adviso ...
Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team[Updated 9 August 2005 ...

Exploits

# source: wwwsecurityfocuscom/bid/12837/info # # The Linux kernel is reported prone to multiple vulnerabilities that occur because of "range-checking flaws" present in the ISO9660 handling routines # # An attacker may exploit these issues to trigger kernel-based memory corruption Ultimately, the attacker may be able to execute arbitrary ...