CVE-2005-3847

Scores

EPSS

0.001very_low0.1%
0%20%40%60%80%100%

Percentile: 0.1%

CVSS

5.5medium3.x
0246810

CVSS Score: 5.5/10

All CVSS Scores

CVSS 3.x
5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
4.0

Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C

Description

The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

CWEs

CWE-667

Related Vulnerabilities

BDU:2015-02209BDU:2015-02210BDU:2015-02211BDU:2015-02212BDU:2015-02213BDU:2015-02214BDU:2015-02215BDU:2015-02216BDU:2015-02217BDU:2015-02218BDU:2015-02219BDU:2015-02220BDU:2015-02221BDU:2015-02222BDU:2015-02223BDU:2015-02224BDU:2015-02225BDU:2015-02226BDU:2015-02227BDU:2015-02228BDU:2015-02229BDU:2015-02230BDU:2015-02231BDU:2015-02232BDU:2015-02233BDU:2015-02234BDU:2015-02235BDU:2015-02236BDU:2015-02237BDU:2015-02238BDU:2015-02239BDU:2015-02240BDU:2015-02241BDU:2015-02242BDU:2015-02243BDU:2015-02244BDU:2015-02245BDU:2015-02246BDU:2015-02247BDU:2015-02248BDU:2015-02249BDU:2015-02250BDU:2015-02251BDU:2015-02252BDU:2015-02253BDU:2015-02254BDU:2015-02255BDU:2015-02256BDU:2015-02257BDU:2015-02258BDU:2015-02259BDU:2015-02260BDU:2015-02261BDU:2015-02262BDU:2015-02263BDU:2015-02264BDU:2015-02265BDU:2015-02266BDU:2015-02267BDU:2015-02268BDU:2015-02269BDU:2015-02270BDU:2015-02271BDU:2015-02272BDU:2015-02273BDU:2015-02274BDU:2015-02275BDU:2015-02276BDU:2015-02277BDU:2015-02278BDU:2015-02279BDU:2015-02280BDU:2015-02281BDU:2015-02282BDU:2015-02283BDU:2015-02284BDU:2015-02285BDU:2015-02286BDU:2015-02287BDU:2015-02288BDU:2015-02289BDU:2015-02290BDU:2015-02291BDU:2015-02292BDU:2015-02293BDU:2015-02294BDU:2015-02295BDU:2015-02296BDU:2015-02297BDU:2015-02298BDU:2015-02299BDU:2015-02300BDU:2015-02301BDU:2015-02302BDU:2015-02303BDU:2015-02304BDU:2015-02305BDU:2015-02306BDU:2015-02307BDU:2015-02308BDU:2015-02309BDU:2015-02310BDU:2015-02311BDU:2015-02312BDU:2015-02313BDU:2015-02314BDU:2015-02315BDU:2015-02316BDU:2015-02317BDU:2015-02318BDU:2015-02319BDU:2015-02320BDU:2015-02321BDU:2015-02322BDU:2015-02323BDU:2015-02324BDU:2015-02325BDU:2015-02326BDU:2015-02327BDU:2015-02328BDU:2015-02329BDU:2015-02330BDU:2015-02331BDU:2015-02332BDU:2015-02333BDU:2015-02334BDU:2015-02335BDU:2015-02336BDU:2015-02337BDU:2015-02338BDU:2015-02339BDU:2015-02340BDU:2015-02341BDU:2015-02342BDU:2015-02343BDU:2015-02344BDU:2015-02345BDU:2015-02346BDU:2015-02347BDU:2015-02348BDU:2015-02349BDU:2015-02350BDU:2015-02351BDU:2015-02352BDU:2015-02353BDU:2015-02354BDU:2015-02355BDU:2015-02356BDU:2015-02357BDU:2015-02358BDU:2015-02359BDU:2015-02360BDU:2015-02361BDU:2015-02362BDU:2015-02363BDU:2015-02364BDU:2015-02365BDU:2015-02366BDU:2015-02367BDU:2015-02368BDU:2015-02370BDU:2015-02371BDU:2015-02389

Vulnerable Software (3)

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "fixed": "2.6.13-1"}

Source: debian

Type: Configuration

Vendor: debian

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: linux

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",      "versionEndExcluding": "2.6.13",      "versionStartIncluding": "2.6.11",      "vulnerable": true    ...

Source: nvd