Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-xzy3-3aaj-bqcc
Vulnerability ID VCID-xzy3-3aaj-bqcc
Aliases CVE-2005-3274
Summary security flaw
Status Published
Exploitability 0.5
Weighted Severity 4.2
Risk 2.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
ssvc Track http://lkml.org/lkml/2005/6/23/249
ssvc Track http://lkml.org/lkml/2005/6/24/173
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
epss 0.0009 https://api.first.org/data/v1/epss?cve=CVE-2005-3274
ssvc Track http://secunia.com/advisories/17826
ssvc Track http://secunia.com/advisories/18056
ssvc Track http://secunia.com/advisories/18684
ssvc Track http://secunia.com/advisories/18977
cvssv2 1.2 https://nvd.nist.gov/vuln/detail/CVE-2005-3274
cvssv3.1 4.7 https://nvd.nist.gov/vuln/detail/CVE-2005-3274
ssvc Track https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
ssvc Track https://usn.ubuntu.com/219-1/
ssvc Track http://www.debian.org/security/2005/dsa-922
ssvc Track http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d
ssvc Track http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
ssvc Track http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
ssvc Track http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
ssvc Track http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
ssvc Track http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
ssvc Track http://www.redhat.com/support/errata/RHSA-2005-663.html
ssvc Track http://www.redhat.com/support/errata/RHSA-2006-0190.html
ssvc Track http://www.securityfocus.com/archive/1/427980/100/0/threaded
ssvc Track http://www.securityfocus.com/archive/1/427981/100/0/threaded
ssvc Track http://www.securityfocus.com/bid/15528
Reference id Reference type URL
http://lkml.org/lkml/2005/6/23/249
http://lkml.org/lkml/2005/6/24/173
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3274.json
https://api.first.org/data/v1/epss?cve=CVE-2005-3274
http://secunia.com/advisories/17826
http://secunia.com/advisories/18056
http://secunia.com/advisories/18684
http://secunia.com/advisories/18977
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
http://www.debian.org/security/2005/dsa-922
http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.securityfocus.com/bid/15528
1617811 https://bugzilla.redhat.com/show_bug.cgi?id=1617811
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2005-3274 https://nvd.nist.gov/vuln/detail/CVE-2005-3274
RHSA-2005:514 https://access.redhat.com/errata/RHSA-2005:514
RHSA-2005:663 https://access.redhat.com/errata/RHSA-2005:663
RHSA-2006:0190 https://access.redhat.com/errata/RHSA-2006:0190
USN-219-1 https://usn.ubuntu.com/219-1/
No exploits are available.

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://lkml.org/lkml/2005/6/23/249

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://lkml.org/lkml/2005/6/24/173

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://secunia.com/advisories/17826

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://secunia.com/advisories/18056

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://secunia.com/advisories/18684

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://secunia.com/advisories/18977
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2005-3274
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2005-3274
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at https://usn.ubuntu.com/219-1/

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.debian.org/security/2005/dsa-922

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.mandriva.com/security/advisories?name=MDKSA-2005:218

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.mandriva.com/security/advisories?name=MDKSA-2005:219

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.mandriva.com/security/advisories?name=MDKSA-2005:220

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.mandriva.com/security/advisories?name=MDKSA-2005:235

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.redhat.com/support/errata/RHSA-2005-663.html

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.redhat.com/support/errata/RHSA-2006-0190.html

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.securityfocus.com/archive/1/427980/100/0/threaded

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.securityfocus.com/archive/1/427981/100/0/threaded

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T18:26:04Z/ Found at http://www.securityfocus.com/bid/15528
Exploit Prediction Scoring System (EPSS)
Percentile 0.25604
EPSS Score 0.0009
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T15:00:35.328698+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3274.json 38.0.0