The Pax Team Pax Linux up to 2.1 Access Restriction memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.3 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in The Pax Team Pax Linux up to 2.1. This issue affects some unknown processing of the component Access Restriction. Performing a manipulation results in memory corruption. This vulnerability is reported as CVE-2005-0666. Moreover, an exploit is present. It is suggested to upgrade the affected component.
Details
A vulnerability was found in The Pax Team Pax Linux up to 2.1. It has been classified as problematic. This affects an unknown code of the component Access Restriction. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Unknown vulnerability in PaX from the September 2003 release to 2.2 before 2005.03.05, related to SEGMEXEC or RANDEXEC and VMA mirroring, allows local users and possibly remote attackers to bypass intended access restrictions and execute arbitrary code.
The weakness was disclosed 03/05/2005 by pageexec (Website). It is possible to read the advisory at securityfocus.com. This vulnerability is uniquely identified as CVE-2005-0666 since 03/07/2005. The exploitability is told to be easy. Attacking locally is a requirement. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available.
A public exploit has been developed by Christophe Devine and been published 2 weeks after the advisory. The exploit is shared for download at securiteam.com. It is declared as proof-of-concept.
Upgrading to version 2.2 eliminates this vulnerability.
The vulnerability is also documented in the databases at Exploit-DB (876), SecurityFocus (BID 12729†), OSVDB (14564†) and Secunia (SA14489†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.9
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Christophe Devine
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Upgrade: Pax Linux 2.2
Timeline
03/05/2005 🔍03/05/2005 🔍
03/06/2005 🔍
03/07/2005 🔍
03/07/2005 🔍
03/14/2005 🔍
03/15/2005 🔍
05/02/2005 🔍
03/10/2015 🔍
01/01/2025 🔍
Sources
Advisory: securityfocus.com⛔Researcher: pageexec
Status: Confirmed
CVE: CVE-2005-0666 (🔍)
GCVE (CVE): GCVE-0-2005-0666
GCVE (VulDB): GCVE-100-24567
SecurityFocus: 12729 - PaX VMA Mirroring Privilege Escalation Vulnerability
Secunia: 14489 - PaX VMA Mirroring Unmapping Privilege Escalation Vulnerability, Less Critical
OSVDB: 14564 - PaX vma Mirroring Local Privilege Escalation
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 03/10/2015 23:05Updated: 01/01/2025 05:18
Changes: 03/10/2015 23:05 (57), 07/22/2017 10:30 (11), 01/01/2025 05:18 (16)
Complete: 🔍
Cache ID: 216:8DF:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.