CVE-2005-3180 : Dettaglio

CVE-2005-3180

1.36%V4
Network
2005-10-11
08h00 +00:00
2024-08-07
23h01 +00:00
Notifiche per una CVE specifica
Rimani informato su qualsiasi modifica relativa a una CVE specifica.
Gestione notifiche

Descrizioni CVE

The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.

Informazioni CVE

Metriche

Metriche Punteggio Gravità CVSS Vettore Source
V2 5 AV:N/AC:L/Au:N/C:P/I:N/A:N nvd@nist.gov

EPSS

EPSS è un modello di punteggio che prevede la probabilità che una vulnerabilità venga sfruttata.

Punteggio EPSS

Il modello EPSS produce un punteggio di probabilità compreso tra 0 e 1 (da 0 a 100%). Più alto è il punteggio, maggiore è la probabilità che una vulnerabilità venga sfruttata.

Percentile EPSS

Il percentile viene utilizzato per classificare le CVE in base al loro punteggio EPSS. Ad esempio, una CVE al 95° percentile secondo il suo punteggio EPSS ha una probabilità maggiore di essere sfruttata rispetto al 95% delle altre CVE. Il percentile consente quindi di confrontare il punteggio EPSS di una CVE con quello delle altre.

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 2.6.13

Riferimenti

http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2006-0140.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2005-808.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/17917
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18684
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/advisories/9806
Tags : vendor-advisory, x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
Tags : vendor-advisory, x_refsource_MANDRAKE
http://secunia.com/advisories/17364
Tags : third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/75
Tags : third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/428058/100/0/threaded
Tags : vendor-advisory, x_refsource_FEDORA
https://usn.ubuntu.com/219-1/
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2006-0190.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
Tags : vendor-advisory, x_refsource_MANDRAKE
http://www.securityfocus.com/archive/1/428028/100/0/threaded
Tags : vendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/15085
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/17280
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17826
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/advisories/9549
Tags : vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/17918
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/427980/100/0/threaded
Tags : vendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2006/dsa-1017
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
Tags : vendor-advisory, x_refsource_MANDRAKE
http://secunia.com/advisories/17114
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19374
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0191.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=112914754708402&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/18562
Tags : third-party-advisory, x_refsource_SECUNIA