5
CVSSv2

CVE-2005-3180

Published: 12/10/2005 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and previous versions does not properly clear memory from a previously used packet whose length is increased, which allows remote malicious users to obtain sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and a pageattribute mapping bug are now available for Red Hat Enterprise Linux 4 This update has been rated as having important security impact by theRed Hat Security Re ...
The problem can be corrected by updating your system to the following package versions: ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-1017 Multiple overflows exist in the io_edgeport driver which might be usable as a denial of ...

References

NVD-CWE-Otherhttp://www.securityfocus.com/advisories/9549http://www.redhat.com/support/errata/RHSA-2005-808.htmlhttp://secunia.com/advisories/17364http://www.securityfocus.com/bid/15085http://www.securityfocus.com/advisories/9806http://secunia.com/advisories/17917http://secunia.com/advisories/17918http://www.redhat.com/support/errata/RHSA-2006-0140.htmlhttp://secunia.com/advisories/18562http://www.redhat.com/support/errata/RHSA-2006-0190.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0191.htmlhttp://secunia.com/advisories/18684http://www.debian.org/security/2006/dsa-1017http://secunia.com/advisories/17114http://secunia.com/advisories/17280http://secunia.com/advisories/17826http://secunia.com/advisories/19374http://www.mandriva.com/security/advisories?name=MDKSA-2005:218http://www.mandriva.com/security/advisories?name=MDKSA-2005:235http://securityreason.com/securityalert/75http://marc.info/?l=bugtraq&m=112914754708402&w=2http://www.mandriva.com/security/advisories?name=MDKSA-2005:220http://www.mandriva.com/security/advisories?name=MDKSA-2005:219https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11332https://usn.ubuntu.com/219-1/http://www.securityfocus.com/archive/1/428058/100/0/threadedhttp://www.securityfocus.com/archive/1/428028/100/0/threadedhttp://www.securityfocus.com/archive/1/427980/100/0/threadedhttp://www.securityfocus.com/archive/1/419522/100/0/threadedhttp://www.kernel.org/hg/linux-2.6/?cmd=changeset%3Bnode=feecb2ffde28639e60ede769c6f817dc536c677bhttps://access.redhat.com/errata/RHSA-2005:808https://usn.ubuntu.com/219-1/https://nvd.nist.gov