Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2005-4881

Disclosure Date: October 19, 2009
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • linux

Products

  • linux kernel 2.4.1,
  • linux kernel 2.4.10,
  • linux kernel 2.4.11,
  • linux kernel 2.4.12,
  • linux kernel 2.4.13,
  • linux kernel 2.4.14,
  • linux kernel 2.4.15,
  • linux kernel 2.4.16,
  • linux kernel 2.4.17,
  • linux kernel 2.4.18,
  • linux kernel 2.4.19,
  • linux kernel 2.4.2,
  • linux kernel 2.4.20,
  • linux kernel 2.4.21,
  • linux kernel 2.4.22,
  • linux kernel 2.4.23,
  • linux kernel 2.4.24,
  • linux kernel 2.4.25,
  • linux kernel 2.4.26,
  • linux kernel 2.4.27,
  • linux kernel 2.4.28,
  • linux kernel 2.4.29,
  • linux kernel 2.4.3,
  • linux kernel 2.4.30,
  • linux kernel 2.4.31,
  • linux kernel 2.4.32,
  • linux kernel 2.4.33,
  • linux kernel 2.4.33.1,
  • linux kernel 2.4.33.2,
  • linux kernel 2.4.33.3,
  • linux kernel 2.4.33.4,
  • linux kernel 2.4.33.5,
  • linux kernel 2.4.33.7,
  • linux kernel 2.4.34,
  • linux kernel 2.4.34.1,
  • linux kernel 2.4.34.2,
  • linux kernel 2.4.34.3,
  • linux kernel 2.4.34.4,
  • linux kernel 2.4.34.5,
  • linux kernel 2.4.34.6,
  • linux kernel 2.4.35.1,
  • linux kernel 2.4.35.2,
  • linux kernel 2.4.35.3,
  • linux kernel 2.4.35.4,
  • linux kernel 2.4.35.5,
  • linux kernel 2.4.36,
  • linux kernel 2.4.36.1,
  • linux kernel 2.4.36.2,
  • linux kernel 2.4.36.3,
  • linux kernel 2.4.36.4,
  • linux kernel 2.4.36.5,
  • linux kernel 2.4.36.6,
  • linux kernel 2.4.36.7,
  • linux kernel 2.4.36.8,
  • linux kernel 2.4.36.9,
  • linux kernel 2.4.37,
  • linux kernel 2.4.37.1,
  • linux kernel 2.4.37.2,
  • linux kernel 2.4.37.3,
  • linux kernel 2.4.37.4,
  • linux kernel 2.4.37.5,
  • linux kernel 2.4.4,
  • linux kernel 2.4.5,
  • linux kernel 2.4.6,
  • linux kernel 2.4.7,
  • linux kernel 2.4.8,
  • linux kernel 2.4.9,
  • linux kernel 2.6.0,
  • linux kernel 2.6.1,
  • linux kernel 2.6.10,
  • linux kernel 2.6.11,
  • linux kernel 2.6.11.1,
  • linux kernel 2.6.11.10,
  • linux kernel 2.6.11.11,
  • linux kernel 2.6.11.12,
  • linux kernel 2.6.11.2,
  • linux kernel 2.6.11.3,
  • linux kernel 2.6.11.4,
  • linux kernel 2.6.11.5,
  • linux kernel 2.6.11.6,
  • linux kernel 2.6.11.7,
  • linux kernel 2.6.11.8,
  • linux kernel 2.6.11.9,
  • linux kernel 2.6.12,
  • linux kernel 2.6.12.1,
  • linux kernel 2.6.12.2,
  • linux kernel 2.6.12.3,
  • linux kernel 2.6.12.4,
  • linux kernel 2.6.12.5,
  • linux kernel 2.6.12.6

References

Advisory

Additional Info

Technical Analysis