Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2005-0736


Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.


Published

2005-03-09T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 2.1 (LOW)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System conectiva linux 10.0 Yes
Operating System linux linux_kernel 2.6.0 Yes
Operating System linux linux_kernel 2.6.1 Yes
Operating System linux linux_kernel 2.6.2 Yes
Operating System linux linux_kernel 2.6.3 Yes
Operating System linux linux_kernel 2.6.4 Yes
Operating System linux linux_kernel 2.6.5 Yes
Operating System linux linux_kernel 2.6.6 Yes
Operating System linux linux_kernel 2.6.7 Yes
Operating System linux linux_kernel 2.6.8 Yes
Operating System linux linux_kernel 2.6.9 Yes
Operating System linux linux_kernel 2.6.10 Yes
Operating System linux linux_kernel 2.6.11 Yes
Operating System redhat enterprise_linux 4.0 Yes
Operating System redhat enterprise_linux 4.0 Yes
Operating System redhat enterprise_linux 4.0 Yes
Operating System redhat enterprise_linux_desktop 4.0 Yes
Operating System redhat fedora_core core_2.0 Yes
Operating System redhat fedora_core core_3.0 Yes

References