Lucene search

K
nvd[email protected]NVD:CVE-2003-0246
HistoryJun 16, 2003 - 4:00 a.m.

CVE-2003-0246

2003-06-1604:00:00
web.nvd.nist.gov

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.4%

The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.2
OR
linuxlinux_kernelMatch2.4.3
OR
linuxlinux_kernelMatch2.4.4
OR
linuxlinux_kernelMatch2.4.5
OR
linuxlinux_kernelMatch2.4.6
OR
linuxlinux_kernelMatch2.4.7
OR
linuxlinux_kernelMatch2.4.8
OR
linuxlinux_kernelMatch2.4.9
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.20
OR
linuxlinux_kernelMatch2.5.0
OR
linuxlinux_kernelMatch2.5.1
OR
linuxlinux_kernelMatch2.5.2
OR
linuxlinux_kernelMatch2.5.3
OR
linuxlinux_kernelMatch2.5.4
OR
linuxlinux_kernelMatch2.5.5
OR
linuxlinux_kernelMatch2.5.6
OR
linuxlinux_kernelMatch2.5.7
OR
linuxlinux_kernelMatch2.5.8
OR
linuxlinux_kernelMatch2.5.9
OR
linuxlinux_kernelMatch2.5.10
OR
linuxlinux_kernelMatch2.5.11
OR
linuxlinux_kernelMatch2.5.12
OR
linuxlinux_kernelMatch2.5.13
OR
linuxlinux_kernelMatch2.5.14
OR
linuxlinux_kernelMatch2.5.15
OR
linuxlinux_kernelMatch2.5.16
OR
linuxlinux_kernelMatch2.5.17
OR
linuxlinux_kernelMatch2.5.18
OR
linuxlinux_kernelMatch2.5.19
OR
linuxlinux_kernelMatch2.5.20
OR
linuxlinux_kernelMatch2.5.21
OR
linuxlinux_kernelMatch2.5.22
OR
linuxlinux_kernelMatch2.5.23
OR
linuxlinux_kernelMatch2.5.24
OR
linuxlinux_kernelMatch2.5.25
OR
linuxlinux_kernelMatch2.5.26
OR
linuxlinux_kernelMatch2.5.27
OR
linuxlinux_kernelMatch2.5.28
OR
linuxlinux_kernelMatch2.5.29
OR
linuxlinux_kernelMatch2.5.30
OR
linuxlinux_kernelMatch2.5.31
OR
linuxlinux_kernelMatch2.5.32
OR
linuxlinux_kernelMatch2.5.33
OR
linuxlinux_kernelMatch2.5.34
OR
linuxlinux_kernelMatch2.5.35
OR
linuxlinux_kernelMatch2.5.36
OR
linuxlinux_kernelMatch2.5.37
OR
linuxlinux_kernelMatch2.5.38
OR
linuxlinux_kernelMatch2.5.39
OR
linuxlinux_kernelMatch2.5.40
OR
linuxlinux_kernelMatch2.5.41
OR
linuxlinux_kernelMatch2.5.42
OR
linuxlinux_kernelMatch2.5.43
OR
linuxlinux_kernelMatch2.5.44
OR
linuxlinux_kernelMatch2.5.45
OR
linuxlinux_kernelMatch2.5.46
OR
linuxlinux_kernelMatch2.5.47
OR
linuxlinux_kernelMatch2.5.48
OR
linuxlinux_kernelMatch2.5.49
OR
linuxlinux_kernelMatch2.5.50
OR
linuxlinux_kernelMatch2.5.51
OR
linuxlinux_kernelMatch2.5.52
OR
linuxlinux_kernelMatch2.5.53
OR
linuxlinux_kernelMatch2.5.54
OR
linuxlinux_kernelMatch2.5.55
OR
linuxlinux_kernelMatch2.5.56
OR
linuxlinux_kernelMatch2.5.57
OR
linuxlinux_kernelMatch2.5.58
OR
linuxlinux_kernelMatch2.5.59
OR
linuxlinux_kernelMatch2.5.60
OR
linuxlinux_kernelMatch2.5.61
OR
linuxlinux_kernelMatch2.5.62
OR
linuxlinux_kernelMatch2.5.63
OR
linuxlinux_kernelMatch2.5.64
OR
linuxlinux_kernelMatch2.5.65
OR
linuxlinux_kernelMatch2.5.66
OR
linuxlinux_kernelMatch2.5.67
OR
linuxlinux_kernelMatch2.5.68
OR
linuxlinux_kernelMatch2.5.69

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.4%