First published: Sat Dec 31 2005(Updated: )
NetBSD 2.0 before 2.0.4, 2.1 before 2.1.1, and 3, when the kernel is compiled with "options DIAGNOSTIC," allows local users to cause a denial of service (kernel assertion panic) via a negative linger time in the SO_LINGER socket option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =2.1 | |
NetBSD NetBSD | =2.0.2 | |
NetBSD NetBSD | =2.0.3 | |
NetBSD NetBSD | =2.0.1 | |
NetBSD NetBSD | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4782 is considered to have a medium severity due to its potential for causing denial of service through kernel assertion panic.
To fix CVE-2005-4782, upgrade your NetBSD system to version 2.0.4, 2.1.1, or later versions.
Local users of NetBSD versions 2.0 through 2.1 who have compiled the kernel with 'options DIAGNOSTIC' are affected by CVE-2005-4782.
CVE-2005-4782 is a denial of service vulnerability related to inappropriate handling of the SO_LINGER socket option.
No, CVE-2005-4782 can only be exploited by local users with access to the affected system.