CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
9.7%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.13.2004.008.01");
script_cve_id("CVE-2003-0985");
script_tag(name:"creation_date", value:"2022-04-21 12:12:27 +0000 (Thu, 21 Apr 2022)");
script_version("2024-02-01T14:37:13+0000");
script_tag(name:"last_modification", value:"2024-02-01 14:37:13 +0000 (Thu, 01 Feb 2024)");
script_tag(name:"cvss_base", value:"7.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_name("Slackware: Security Advisory (SSA:2004-008-01)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Slackware Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/slackware_linux", "ssh/login/slackpack", re:"ssh/login/release=SLK8\.1");
script_xref(name:"Advisory-ID", value:"SSA:2004-008-01");
script_xref(name:"URL", value:"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.458438");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel' package(s) announced via the SSA:2004-008-01 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"New kernels are available for Slackware 8.1 containing a
backported fix from a bounds-checking problem in the kernel's
mremap() call which could be used by a local attacker to gain
root privileges. This fix was previously issued for Slackware
9.0, 9.1, and -current (SSA:2004-006-01).
Sites running Slackware 8.1 should upgrade to the new kernel.
After installing the new kernel, be sure to run 'lilo'.
More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:
[link moved to references]
Here are the details from the Slackware 8.1 ChangeLog:
+--------------------------+
Thu Jan 8 18:21:27 PST 2004
patches/kernels/*: These are 2.4.18 kernels containing a backported
fix for a security problem with the kernel's mremap() function.
A local user could exploit this hole to gain root privileges.
For more details, see:
[link moved to references]
After installing the new kernel, be sure to run 'lilo'.
(* Security fix *)
patches/packages/kernel-ide-2.4.18-i386-5.tgz: Patched mremap().
(* Security fix *)
patches/packages/kernel-source-2.4.18-noarch-6.tgz: This is
the source code from kernel-source-2.4.18-noarch-5 with the fix
for mremap().
(* Security fix *)
+--------------------------+");
script_tag(name:"affected", value:"'kernel' package(s) on Slackware 8.1.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-slack.inc");
release = slk_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "SLK8.1") {
if(!isnull(res = isslkpkgvuln(pkg:"kernel-ide", ver:"2.4.18-i386-5", rls:"SLK8.1"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"kernel-source", ver:"2.4.18-noarch-6", rls:"SLK8.1"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);