Vulnerability CVE-2004-0077


Published: 2004-03-03   Modified: 2012-02-12

Description:
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.

Vendor: Linux
Product: Linux kernel 
Version:
2.6_test9_cvs
2.6.2
2.6.1
2.6.0
2.4.9
2.4.8
2.4.7
2.4.6
2.4.5
2.4.4
2.4.3
2.4.24
2.4.23
2.4.22
2.4.21
2.4.20
2.4.2
2.4.19
2.4.18
2.4.17
2.4.16
2.4.15
2.4.14
2.4.13
2.4.12
2.4.11
2.4.10
2.4.1
2.4.0
2.2.9
2.2.8
2.2.7
2.2.6
2.2.5
2.2.4
2.2.3
2.2.24
2.2.23
2.2.22
2.2.21
2.2.20
2.2.2
2.2.19
2.2.18
2.2.17
2.2.16
2.2.15_pre20
2.2.15
2.2.14
2.2.13
2.2.12
2.2.11
2.2.10
2.2.1
2.2.0
Vendor: Redhat
Product: Bigmem kernel 
Version: 2.4.20-8;
Product: Kernel doc 
Version: 2.4.20-8;
Product: Kernel 
Version: 2.4.20-8;
Product: Kernel source 
Version: 2.4.20-8;
Vendor: Trustix
Product: Secure linux 
Version: 2.0; 1.5;
Vendor: Netwosix
Product: Netwosix linux 
Version: 1.0;

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0040.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000820
http://fedoranews.org/updates/FEDORA-2004-079.shtml
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:015
http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
http://marc.info/?l=bugtraq&m=107711762014175&w=2
http://marc.info/?l=bugtraq&m=107712137732553&w=2
http://marc.info/?l=bugtraq&m=107755871932680&w=2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:825
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:837
http://security.gentoo.org/glsa/glsa-200403-02.xml
http://www.ciac.org/ciac/bulletins/o-082.shtml
http://www.debian.org/security/2004/dsa-438
http://www.debian.org/security/2004/dsa-439
http://www.debian.org/security/2004/dsa-440
http://www.debian.org/security/2004/dsa-441
http://www.debian.org/security/2004/dsa-442
http://www.debian.org/security/2004/dsa-444
http://www.debian.org/security/2004/dsa-450
http://www.debian.org/security/2004/dsa-453
http://www.debian.org/security/2004/dsa-454
http://www.debian.org/security/2004/dsa-456
http://www.debian.org/security/2004/dsa-466
http://www.debian.org/security/2004/dsa-470
http://www.debian.org/security/2004/dsa-475
http://www.debian.org/security/2004/dsa-514
http://www.kb.cert.org/vuls/id/981222
http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-065.html
http://www.redhat.com/support/errata/RHSA-2004-066.html
http://www.redhat.com/support/errata/RHSA-2004-069.html
http://www.redhat.com/support/errata/RHSA-2004-106.html
http://www.securityfocus.com/bid/9686
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.404734
http://xforce.iss.net/xforce/xfdb/15244

Copyright 2018, cxsecurity.com

 

Back to Top