First published: Thu Sep 01 2005(Updated: )
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0403 has a moderate severity level due to its potential for denial of service and privilege escalation.
To resolve CVE-2005-0403, apply the appropriate patches provided by Red Hat for the affected version of the Red Hat Enterprise Linux 3.
CVE-2005-0403 affects local users of Red Hat Enterprise Linux 3, including Desktop, Workstation, Enterprise Server, and Advanced Servers.
CVE-2005-0403 is a local denial of service vulnerability that can lead to system crashes in multi-threaded applications.
While CVE-2005-0403 primarily causes denial of service, there is a potential risk for privilege escalation via unknown attack vectors.