Lucene search

K
nvd[email protected]NVD:CVE-2004-0077
HistoryMar 03, 2004 - 5:00 a.m.

CVE-2004-0077

2004-03-0305:00:00
web.nvd.nist.gov

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.7%

The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.

Affected configurations

NVD
Node
redhatbigmem_kernelMatch2.4.20-8i686
OR
redhatkernelMatch2.4.20-8athlon_smp
OR
redhatkernelMatch2.4.20-8i386
OR
redhatkernelMatch2.4.20-8i686_smp
OR
redhatkernel_docMatch2.4.20-8i386
Node
redhatkernel_sourceMatch2.4.20-8i386_src
OR
linuxlinux_kernelMatch2.2.0
OR
linuxlinux_kernelMatch2.2.1
OR
linuxlinux_kernelMatch2.2.2
OR
linuxlinux_kernelMatch2.2.3
OR
linuxlinux_kernelMatch2.2.4
OR
linuxlinux_kernelMatch2.2.5
OR
linuxlinux_kernelMatch2.2.6
OR
linuxlinux_kernelMatch2.2.7
OR
linuxlinux_kernelMatch2.2.8
OR
linuxlinux_kernelMatch2.2.9
OR
linuxlinux_kernelMatch2.2.10
OR
linuxlinux_kernelMatch2.2.11
OR
linuxlinux_kernelMatch2.2.12
OR
linuxlinux_kernelMatch2.2.13
OR
linuxlinux_kernelMatch2.2.14
OR
linuxlinux_kernelMatch2.2.15
OR
linuxlinux_kernelMatch2.2.15pre16
OR
linuxlinux_kernelMatch2.2.15_pre20
OR
linuxlinux_kernelMatch2.2.16
OR
linuxlinux_kernelMatch2.2.16pre6
OR
linuxlinux_kernelMatch2.2.17
OR
linuxlinux_kernelMatch2.2.18
OR
linuxlinux_kernelMatch2.2.19
OR
linuxlinux_kernelMatch2.2.20
OR
linuxlinux_kernelMatch2.2.21
OR
linuxlinux_kernelMatch2.2.22
OR
linuxlinux_kernelMatch2.2.23
OR
linuxlinux_kernelMatch2.2.24
OR
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.2
OR
linuxlinux_kernelMatch2.4.3
OR
linuxlinux_kernelMatch2.4.4
OR
linuxlinux_kernelMatch2.4.5
OR
linuxlinux_kernelMatch2.4.6
OR
linuxlinux_kernelMatch2.4.7
OR
linuxlinux_kernelMatch2.4.8
OR
linuxlinux_kernelMatch2.4.9
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.18x86
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OR
linuxlinux_kernelMatch2.4.20
OR
linuxlinux_kernelMatch2.4.21
OR
linuxlinux_kernelMatch2.4.21pre1
OR
linuxlinux_kernelMatch2.4.21pre4
OR
linuxlinux_kernelMatch2.4.21pre7
OR
linuxlinux_kernelMatch2.4.22
OR
linuxlinux_kernelMatch2.4.23
OR
linuxlinux_kernelMatch2.4.23pre9
OR
linuxlinux_kernelMatch2.4.24
OR
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.0test1
OR
linuxlinux_kernelMatch2.6.0test10
OR
linuxlinux_kernelMatch2.6.0test11
OR
linuxlinux_kernelMatch2.6.0test2
OR
linuxlinux_kernelMatch2.6.0test3
OR
linuxlinux_kernelMatch2.6.0test4
OR
linuxlinux_kernelMatch2.6.0test5
OR
linuxlinux_kernelMatch2.6.0test6
OR
linuxlinux_kernelMatch2.6.0test7
OR
linuxlinux_kernelMatch2.6.0test8
OR
linuxlinux_kernelMatch2.6.0test9
OR
linuxlinux_kernelMatch2.6.1rc1
OR
linuxlinux_kernelMatch2.6.1rc2
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6_test9_cvs
OR
netwosixnetwosix_linuxMatch1.0
OR
trustixsecure_linuxMatch1.5
OR
trustixsecure_linuxMatch2.0
AND
redhatkernelMatch2.4.20-8athlon
OR
redhatkernelMatch2.4.20-8i386
OR
redhatkernelMatch2.4.20-8i686

References

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.7%