Linux Kernel up to 2.4.32 search_binary_handler resource management

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.2 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in Linux Kernel. The affected element is the function search_binary_handler. The manipulation leads to resource management.
This vulnerability is uniquely identified as CVE-2005-2708. No exploit exists.
You should upgrade the affected component.
Details
A vulnerability was found in Linux Kernel (Operating System). It has been rated as critical. This issue affects the function search_binary_handler. The manipulation with an unknown input leads to a resource management vulnerability. Using CWE to declare the problem leads to CWE-399. Impacted is availability. The summary by CVE is:
The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.
The weakness was disclosed 01/20/2006 by blossom as Bug 161925 as not defined bug report (Bugzilla). The advisory is shared at bugzilla.redhat.com. The identification of this vulnerability is CVE-2005-2708 since 08/26/2005. The attack can only be initiated within the local network. No form of authentication is needed for a successful exploitation. Technical details are known, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 21881 (CentOS 3 : kernel (CESA-2006:0140)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CentOS Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 117771 (CentOS Security Update for Kernel (CESA-2006:0140)).
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at ftp.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (32162), Tenable (21881), SecurityFocus (BID 16320†), OSVDB (22668†) and Secunia (SA18523†). The entries VDB-1833, VDB-1879, VDB-19827 and VDB-23857 are pretty similar. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
- 2.4.0
- 2.4.1
- 2.4.2
- 2.4.3
- 2.4.4
- 2.4.5
- 2.4.6
- 2.4.7
- 2.4.8
- 2.4.9
- 2.4.10
- 2.4.11
- 2.4.12
- 2.4.13
- 2.4.14
- 2.4.15
- 2.4.16
- 2.4.17
- 2.4.18
- 2.4.19
- 2.4.20
- 2.4.21
- 2.4.22
- 2.4.23
- 2.4.23 Ow2
- 2.4.24
- 2.4.24 Ow1
- 2.4.25
- 2.4.26
- 2.4.27
- 2.4.28
- 2.4.29
- 2.4.30
- 2.4.31
- 2.4.32
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.2
VulDB Base Score: 6.5
VulDB Temp Score: 6.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 21881
Nessus Name: CentOS 3 : kernel (CESA-2006:0140)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Patch: ftp.kernel.org
Timeline
06/28/2005 🔍08/26/2005 🔍
10/25/2005 🔍
10/25/2005 🔍
01/19/2006 🔍
01/20/2006 🔍
01/20/2006 🔍
01/24/2006 🔍
07/03/2006 🔍
01/30/2008 🔍
08/04/2019 🔍
Sources
Vendor: kernel.orgAdvisory: Bug 161925
Researcher: blossom
Status: Not defined
Confirmation: 🔍
CVE: CVE-2005-2708 (🔍)
GCVE (CVE): GCVE-0-2005-2708
GCVE (VulDB): GCVE-100-1997
OVAL: 🔍
X-Force: 32162
SecurityFocus: 16320 - Linux Kernel SEARCH_BINARY_HANDLER Local Denial of Service Vulnerability
Secunia: 18523
OSVDB: 22668 - Linux Kernel search_binary_handler() Function Local DoS
Vulnerability Center: 17493 - Linux Kernel Exec.c Allows Local Users to Cause Denial of Service, Low
See also: 🔍
Entry
Created: 01/24/2006 12:15Updated: 08/04/2019 11:59
Changes: 01/24/2006 12:15 (86), 08/04/2019 11:59 (1)
Complete: 🔍
Cache ID: 216:AA1:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.