Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-0736

8 documents7 sources
Severity
2.1LOW
EPSS
0.0%
top 84.77%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 9
Latest updateMay 1

Description

Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.

CVSS vector

AV:L/AC:L/C:N/I:P/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages4 packages

NVDlinux/linux_kernel12 versions+11
NVDconectiva/linux10.0
NVDredhat/fedora_corecore_2.0, core_3.0+1

Also affects: Enterprise Linux 4.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3279-jg8p-4jv6: Integer overflow in sys_epoll_wait in eventpoll2022-05-01
CVEList
CVE-2005-0736: Integer overflow in sys_epoll_wait in eventpoll2005-03-13

💥Exploits & PoCs

2
Exploit-DB
Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation2005-12-30
Exploit-DB
Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1)2005-03-09

📋Vendor Advisories

2
Ubuntu
Linux kernel vulnerabilities2005-03-15
Red Hat
security flaw2005-03-09

💬Community

1
Bugzilla
CVE-2005-0736 security flaw2018-08-16