Vulnerability Details : CVE-2005-4881
The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.
Vulnerability category: Information leak
Products affected by CVE-2005-4881
- cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.35.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.37.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre1:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.37.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.35.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.35.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre3:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre2:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.37.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.35.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.33.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre4:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre5:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.37.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.34.3:*:*:*:*:*:*:*
Threat overview for CVE-2005-4881
Top countries where our scanners detected CVE-2005-4881
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2005-4881 7,395
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2005-4881!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2005-4881
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-4881
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:C/I:N/A:N |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2005-4881
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2005-4881
-
Red Hat 2009-10-22Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2005-4881 This issue has been rated as having moderate security impact. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, and Red Hat Enterprise MRG. It affects Red Hat Enterprise Linux 3, and 4. It was addressed in Red Hat Enterprise Linux 4 via: https://rhn.redhat.com/errata/RHSA-2009-1522.html This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed. For further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/
References for CVE-2005-4881
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=30e744716c4a6cc4e8ecaaddf68f20057c03dc8d
Patch
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8
Patch
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=3408cce0c2f380884070896420ca566704452fb5
Patch
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b3563c4fbff906991a1b4ef4609f99cca2a0de6a
Patch
-
http://www.openwall.com/lists/oss-security/2009/09/05/2
Patch
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=0f3f2328f63c521fe4b435f148687452f98b2349
Patch
-
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6
Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2009-1522.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11744
-
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2009:064) - openSUSE Security Announce - openSUSE Mailing Lists
-
http://marc.info/?l=git-commits-head&m=112002138324380
Patch
-
http://www.openwall.com/lists/oss-security/2009/09/17/9
Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=521601
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8a47077a0b5aa2649751c46e7a27884e6686ccbf
Patch
-
http://www.openwall.com/lists/oss-security/2009/09/06/2
Patch
-
http://www.openwall.com/lists/oss-security/2009/09/17/1
Patch
-
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.13/ChangeLog-2.6.13-rc1
Patch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2009/09/07/2
Patch
Jump to