← Back to CVEs
CVE-2005-2490
N/ADescription
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
CVE Details
CVSS v3.1 ScoreN/A
Published9/14/2005
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
linux:linux_kernel
References
http://marc.info/?l=bugtraq&m=112690609622266&w=2(secalert@redhat.com)
http://secunia.com/advisories/16747/(secalert@redhat.com)
http://secunia.com/advisories/17002(secalert@redhat.com)
http://secunia.com/advisories/17073(secalert@redhat.com)
http://secunia.com/advisories/17826(secalert@redhat.com)
http://secunia.com/advisories/17918(secalert@redhat.com)
http://secunia.com/advisories/19374(secalert@redhat.com)
http://www.debian.org/security/2006/dsa-1017(secalert@redhat.com)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-514.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-663.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/419522/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/427980/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/428028/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/428058/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/14785(secalert@redhat.com)
http://www.ubuntu.com/usn/usn-178-1(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/1878(secalert@redhat.com)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22217(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481(secalert@redhat.com)
http://marc.info/?l=bugtraq&m=112690609622266&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/16747/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17002(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17073(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17826(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17918(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19374(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1017(af854a3a-2127-422b-91ae-364da2661108)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-514.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-663.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/419522/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/427980/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/428028/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/428058/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/14785(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-178-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/1878(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22217(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.