Vulnerability Description
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 3.0 |
| Redhat | Enterprise Linux Desktop | 3.0 |
References
- http://www.redhat.com/support/errata/RHSA-2005-293.htmlPatchVendor Advisory
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://www.redhat.com/support/errata/RHSA-2005-293.htmlPatchVendor Advisory
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2005-0403?
CVE-2005-0403 is a vulnerability with a CVSS score of 7.2 (HIGH). init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial ...
How severe is CVE-2005-0403?
CVE-2005-0403 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0403?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Redhat Enterprise Linux Desktop.