7.2
CVSSv2

CVE-2005-1263

Published: 11/05/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.2.13

linux linux kernel 2.2.14

linux linux kernel 2.2.20

linux linux kernel 2.2.21

linux linux kernel 2.2.5

linux linux kernel 2.2.6

linux linux kernel 2.4.0

linux linux kernel 2.4.1

linux linux kernel 2.4.16

linux linux kernel 2.4.17

linux linux kernel 2.4.18

linux linux kernel 2.4.19

linux linux kernel 2.4.23

linux linux kernel 2.4.27

linux linux kernel 2.4.30

linux linux kernel 2.4.31

linux linux kernel 2.2.1

linux linux kernel 2.2.10

linux linux kernel 2.2.17

linux linux kernel 2.2.18

linux linux kernel 2.2.24

linux linux kernel 2.2.27

linux linux kernel 2.4.12

linux linux kernel 2.4.13

linux linux kernel 2.4.21

linux linux kernel 2.4.24_ow1

linux linux kernel 2.4.25

linux linux kernel 2.2.11

linux linux kernel 2.2.12

linux linux kernel 2.2.19

linux linux kernel 2.2.2

linux linux kernel 2.2.3

linux linux kernel 2.2.4

linux linux kernel 2.4.14

linux linux kernel 2.4.15

linux linux kernel 2.4.22

linux linux kernel 2.4.26

linux linux kernel 2.4.29

linux linux kernel 2.4.3

linux linux kernel 2.4.9

linux linux kernel 2.6.0

linux linux kernel 2.6.10

linux linux kernel 2.6.6

linux linux kernel 2.6.7

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.11

linux linux kernel 2.6.12

linux linux kernel 2.6.8

linux linux kernel 2.4.28

linux linux kernel 2.4.6

linux linux kernel 2.4.7

linux linux kernel 2.4.8

linux linux kernel 2.6.1

linux linux kernel 2.6.5

linux linux kernel 2.6.9

linux linux kernel 2.2.0

linux linux kernel 2.2.15

linux linux kernel 2.2.16

linux linux kernel 2.2.22

linux linux kernel 2.2.23

linux linux kernel 2.2.7

linux linux kernel 2.2.8

linux linux kernel 2.2.9

linux linux kernel 2.4.10

linux linux kernel 2.4.11

linux linux kernel 2.4.2

linux linux kernel 2.4.20

linux linux kernel 2.4.23_ow2

linux linux kernel 2.4.24

linux linux kernel 2.4.4

linux linux kernel 2.4.5

linux linux kernel 2.6.2

linux linux kernel 2.6.3

linux linux kernel 2.6.4

Vendor Advisories

Colin Percival discovered an information disclosure in the “Hyper Threading Technology” architecture in processors which are capable of simultaneous multithreading (in particular Intel Pentium 4, Intel Mobile Pentium 4, and Intel Xeon processors) This allows a malicious thread to monitor the execution of another thread on the same CPU This co ...
Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues in the Red HatEnterprise Linux 3 kernel are now availableThis security advisory has been rated as having important security impactby the Red Hat Security Response Team ...
Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues as well asother bugs are now available for Red Hat Enterprise Linux 21 (32 bitarchitectures)This update has been rated as having important security impact by theRed ...
Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages are now available to correct security issues andbugs for Red Hat Enterprise Linux version 21 (Itanium)This update has been rated as having important security impact by theRed Hat Security Response Team ...

Exploits

/* source: wwwsecurityfocuscom/bid/13589/info The Linux kernel is susceptible to a local buffer-overflow vulnerability when attempting to create ELF coredumps This issue is due to an integer-overflow flaw that results in a kernel buffer overflow during a 'copy_from_user()' call To exploit this vulnerability, a malicious user creates a ...