First published: Sat Dec 31 2005(Updated: )
Buffer overflow in the CA-driver (dst_ca.c) for TwinHan DST Frontend/Card in Linux kernel 2.6.12 and other versions before 2.6.15 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by "reading more than 8 bytes into an 8 byte long array".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.12-rc1 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12.1 | |
Linux Kernel | =2.6.12.2 | |
Linux Kernel | =2.6.12.3 | |
Linux Kernel | =2.6.12.4 | |
Linux Kernel | =2.6.12.5 | |
Linux Kernel | =2.6.12.6 | |
Linux Kernel | =2.6.13 | |
Linux Kernel | =2.6.13-rc1 | |
Linux Kernel | =2.6.13-rc4 | |
Linux Kernel | =2.6.13-rc6 | |
Linux Kernel | =2.6.13-rc7 | |
Linux Kernel | =2.6.13.1 | |
Linux Kernel | =2.6.13.2 | |
Linux Kernel | =2.6.13.3 | |
Linux Kernel | =2.6.13.4 | |
Linux Kernel | =2.6.14 | |
Linux Kernel | =2.6.14-rc1 | |
Linux Kernel | =2.6.14-rc2 | |
Linux Kernel | =2.6.14-rc3 | |
Linux Kernel | =2.6.14-rc4 | |
Linux Kernel | =2.6.14.1 | |
Linux Kernel | =2.6.14.2 | |
Linux Kernel | =2.6.14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4639 is classified as a critical vulnerability due to its potential for causing denial of service and executing arbitrary code.
To fix CVE-2005-4639, upgrade the Linux kernel to version 2.6.15 or later.
CVE-2005-4639 affects Linux kernel versions 2.6.12 to 2.6.14.3.
CVE-2005-4639 is a buffer overflow vulnerability.
CVE-2005-4639 can be exploited by local users on affected systems.