CVE-2005-0750 (CNNVD-200503-140)

HIGH 有利用代码
中文标题:
Linux Kernel 权限提升漏洞
英文标题:
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and ...
CVSS分数: 7.2
发布时间: 2005-04-03 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v7
漏洞描述
中文描述:

Linux Kernel是开放源代码操作系统Linux的内核。 linux kernel支持蓝牙。在这个蓝牙栈中发现了本地root漏洞。 有漏洞的代码: static int bluez_sock_create(struct socket *sock, int proto) { if (proto >= BLUEZ_MAX_PROTO) return -EINVAL; ... return bluez_proto[proto]->create(sock, proto); } 可以通过调用socket()或socketpair()到达上述代码。如果向协议传送一个负值,就可以绕过边界检查。然后就可以将协议编号用作函数指针索引。攻击者可能将协议用作某些受控内存的索引,导致权限提升。

英文描述:

The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.

CWE类型:
(暂无数据)
标签:
dos linux ilja van sprundel OSVDB-15084 local qobaiashi backdoored.net OSVDB-15783
受影响产品
厂商 产品 版本 版本范围 平台 CPE
conectiva linux 10.0 - - cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
linux linux_kernel 2.4.6 - - cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
linux linux_kernel 2.4.7 - - cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
linux linux_kernel 2.4.8 - - cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
linux linux_kernel 2.4.9 - - cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
linux linux_kernel 2.4.10 - - cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
linux linux_kernel 2.4.11 - - cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
linux linux_kernel 2.4.12 - - cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
linux linux_kernel 2.4.13 - - cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
linux linux_kernel 2.4.14 - - cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
linux linux_kernel 2.4.15 - - cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
linux linux_kernel 2.4.16 - - cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
linux linux_kernel 2.4.17 - - cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
linux linux_kernel 2.4.18 - - cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
linux linux_kernel 2.4.19 - - cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
linux linux_kernel 2.4.20 - - cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
linux linux_kernel 2.4.21 - - cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
linux linux_kernel 2.4.22 - - cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
linux linux_kernel 2.4.23 - - cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
linux linux_kernel 2.4.24 - - cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
linux linux_kernel 2.4.25 - - cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
linux linux_kernel 2.4.26 - - cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
linux linux_kernel 2.4.27 - - cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
linux linux_kernel 2.4.28 - - cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
linux linux_kernel 2.4.29 - - cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
linux linux_kernel 2.6.0 - - cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
linux linux_kernel 2.6.1 - - cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
linux linux_kernel 2.6.2 - - cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
linux linux_kernel 2.6.3 - - cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
linux linux_kernel 2.6.4 - - cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
linux linux_kernel 2.6.5 - - cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
linux linux_kernel 2.6.6 - - cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
linux linux_kernel 2.6.7 - - cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
linux linux_kernel 2.6.8 - - cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
linux linux_kernel 2.6.9 - - cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
linux linux_kernel 2.6.10 - - cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
linux linux_kernel 2.6.11 - - cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
redhat enterprise_linux 4.0 - - cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
redhat enterprise_linux_desktop 4.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
redhat fedora_core core_1.0 - - cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
redhat fedora_core core_2.0 - - cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
redhat fedora_core core_3.0 - - cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
redhat linux 7.3 - - cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
redhat linux 9.0 - - cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
suse suse_linux 1.0 - - cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
suse suse_linux 9.3 - - cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*
ubuntu ubuntu_linux 4.1 - - cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
kernel-bluezsockcreate-integer-underflow(19844) vdb-entry
cve.org
访问
RHSA-2005:366 vendor-advisory
cve.org
访问
RHSA-2005:283 vendor-advisory
cve.org
访问
20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5 mailing-list
cve.org
访问
oval:org.mitre.oval:def:11719 vdb-entry
cve.org
访问
12911 vdb-entry
cve.org
访问
FLSA:152532 vendor-advisory
cve.org
访问
RHSA-2005:293 vendor-advisory
cve.org
访问
RHSA-2005:284 vendor-advisory
cve.org
访问
20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5 mailing-list
cve.org
访问
ExploitDB EDB-25287 EXPLOIT
exploitdb
访问
Download Exploit EDB-25287 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2005-0750 ADVISORY
cve.org
访问
ExploitDB EDB-25288 EXPLOIT
exploitdb
访问
Download Exploit EDB-25288 EXPLOIT
exploitdb
访问
ExploitDB EDB-25289 EXPLOIT
exploitdb
访问
Download Exploit EDB-25289 EXPLOIT
exploitdb
访问
ExploitDB EDB-926 EXPLOIT
exploitdb
访问
Download Exploit EDB-926 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2005-1294 ADVISORY
cve.org
访问
CVSS评分详情
7.2
HIGH
CVSS向量: AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2005-04-03 05:00:00
修改时间:
2024-08-07 21:21:06
创建时间:
2025-11-11 15:32:25
更新时间:
2026-01-26 02:18:33
利用信息
此漏洞有可利用代码!
利用代码数量: 4
利用来源:
未知 未知 未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2005-0750 2025-11-11 15:17:33 2025-11-11 07:32:25
NVD nvd_CVE-2005-0750 2025-11-11 14:51:18 2025-11-11 07:41:11
CNNVD cnnvd_CNNVD-200503-140 2025-11-11 15:08:46 2025-11-11 07:48:57
EXPLOITDB exploitdb_EDB-25287 2025-11-11 15:05:24 2025-11-11 08:21:38
EXPLOITDB exploitdb_EDB-25288 2025-11-11 15:05:25 2025-11-11 08:21:38
EXPLOITDB exploitdb_EDB-25289 2025-11-11 15:05:25 2025-11-11 08:21:38
EXPLOITDB exploitdb_EDB-926 2025-11-11 15:05:25 2025-11-11 09:06:18
版本与语言
当前版本: v7
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v7 EXPLOITDB
2025-11-11 17:06:18
references_count: 17 → 20; tags_count: 7 → 8
查看详细变更
  • references_count: 17 -> 20
  • tags_count: 7 -> 8
v6 EXPLOITDB
2025-11-11 16:21:38
references_count: 15 → 17; tags_count: 6 → 7
查看详细变更
  • references_count: 15 -> 17
  • tags_count: 6 -> 7
v5 EXPLOITDB
2025-11-11 16:21:38
references_count: 13 → 15; tags_count: 4 → 6
查看详细变更
  • references_count: 13 -> 15
  • tags_count: 4 -> 6
v4 EXPLOITDB
2025-11-11 16:21:38
references_count: 10 → 13; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 10 -> 13
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:57
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200503-140; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200503-140
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:11
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.2; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 47; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.2
  • cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 47
  • data_sources: ['cve'] -> ['cve', 'nvd']