7.1 High
AI Score
Confidence
Low
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
27.9%
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
marc.info/?l=bugtraq&m=112690609622266&w=2
secunia.com/advisories/16747/
secunia.com/advisories/17002
secunia.com/advisories/17073
secunia.com/advisories/17826
secunia.com/advisories/17918
secunia.com/advisories/19374
www.debian.org/security/2006/dsa-1017
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
www.mandriva.com/security/advisories?name=MDKSA-2005:219
www.mandriva.com/security/advisories?name=MDKSA-2005:220
www.mandriva.com/security/advisories?name=MDKSA-2005:235
www.redhat.com/support/errata/RHSA-2005-514.html
www.redhat.com/support/errata/RHSA-2005-663.html
www.securityfocus.com/archive/1/419522/100/0/threaded
www.securityfocus.com/archive/1/427980/100/0/threaded
www.securityfocus.com/archive/1/428028/100/0/threaded
www.securityfocus.com/archive/1/428058/100/0/threaded
www.securityfocus.com/bid/14785
www.ubuntu.com/usn/usn-178-1
www.vupen.com/english/advisories/2005/1878
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248
exchange.xforce.ibmcloud.com/vulnerabilities/22217
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481