CVE-2003-0127

Current Description

The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.

Basic Data

PublishedMarch 31, 2003
Last ModifiedMay 03, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel2.2.0*******
    2.3OSLinuxLinux Kernel2.2.1*******
    2.3OSLinuxLinux Kernel2.2.2*******
    2.3OSLinuxLinux Kernel2.2.3*******
    2.3OSLinuxLinux Kernel2.2.4*******
    2.3OSLinuxLinux Kernel2.2.5*******
    2.3OSLinuxLinux Kernel2.2.6*******
    2.3OSLinuxLinux Kernel2.2.7*******
    2.3OSLinuxLinux Kernel2.2.8*******
    2.3OSLinuxLinux Kernel2.2.9*******
    2.3OSLinuxLinux Kernel2.2.10*******
    2.3OSLinuxLinux Kernel2.2.11*******
    2.3OSLinuxLinux Kernel2.2.12*******
    2.3OSLinuxLinux Kernel2.2.13*******
    2.3OSLinuxLinux Kernel2.2.14*******
    2.3OSLinuxLinux Kernel2.2.15*******
    2.3OSLinuxLinux Kernel2.2.16*******
    2.3OSLinuxLinux Kernel2.2.17*******
    2.3OSLinuxLinux Kernel2.2.18*******
    2.3OSLinuxLinux Kernel2.2.19*******
    2.3OSLinuxLinux Kernel2.2.20*******
    2.3OSLinuxLinux Kernel2.2.21*******
    2.3OSLinuxLinux Kernel2.2.22*******
    2.3OSLinuxLinux Kernel2.2.23*******
    2.3OSLinuxLinux Kernel2.2.24*******
    2.3OSLinuxLinux Kernel2.4.0*******
    2.3OSLinuxLinux Kernel2.4.1*******
    2.3OSLinuxLinux Kernel2.4.2*******
    2.3OSLinuxLinux Kernel2.4.3*******
    2.3OSLinuxLinux Kernel2.4.4*******
    2.3OSLinuxLinux Kernel2.4.5*******
    2.3OSLinuxLinux Kernel2.4.6*******
    2.3OSLinuxLinux Kernel2.4.7*******
    2.3OSLinuxLinux Kernel2.4.8*******
    2.3OSLinuxLinux Kernel2.4.9*******
    2.3OSLinuxLinux Kernel2.4.10*******
    2.3OSLinuxLinux Kernel2.4.11*******
    2.3OSLinuxLinux Kernel2.4.12*******
    2.3OSLinuxLinux Kernel2.4.13*******
    2.3OSLinuxLinux Kernel2.4.14*******
    2.3OSLinuxLinux Kernel2.4.15*******
    2.3OSLinuxLinux Kernel2.4.16*******
    2.3OSLinuxLinux Kernel2.4.17*******
    2.3OSLinuxLinux Kernel2.4.18*******
    2.3OSLinuxLinux Kernel2.4.19*******
    2.3OSLinuxLinux Kernel2.4.20*******
    2.3OSLinuxLinux Kernel2.4.21pre1******

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel 2.2.0, 2.2.1, 2.2.10, 2.2.11, 2.2.12, 2.2.13, 2.2.14, 2.2.15, 2.2.16, 2.2.17, 2.2.18, 2.2.19, 2.2.2, 2.2.20, 2.2.21, 2.2.22, 2.2.23, 2.2.24, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.4.0, 2.4.1, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.2, 2.4.20, 2.4.21, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9

References

NameSourceURLTags
CSSA-2003-020.0ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txtCALDERA
20030317 Fwd: Ptrace hole / Linux 2.2.25http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.htmlVULNWATCH
ESA-20030515-017http://marc.info/?l=bugtraq&m=105301461726555&w=2ENGARDE
RHSA-2003:088http://rhn.redhat.com/errata/RHSA-2003-088.htmlREDHAT
RHSA-2003:098http://rhn.redhat.com/errata/RHSA-2003-098.htmlREDHATPatch Vendor Advisory
GLSA-200303-17http://security.gentoo.org/glsa/glsa-200303-17.xmlGENTOO
DSA-270http://www.debian.org/security/2003/dsa-270DEBIAN
DSA-276http://www.debian.org/security/2003/dsa-276DEBIAN
DSA-311http://www.debian.org/security/2003/dsa-311DEBIAN
DSA-312http://www.debian.org/security/2003/dsa-312DEBIAN
DSA-332http://www.debian.org/security/2003/dsa-332DEBIAN
DSA-336http://www.debian.org/security/2003/dsa-336DEBIAN
DSA-423http://www.debian.org/security/2004/dsa-423DEBIAN
DSA-495http://www.debian.org/security/2004/dsa-495DEBIAN
VU#628849http://www.kb.cert.org/vuls/id/628849CERT-VNThird Party Advisory US Government Resource
MDKSA-2003:038http://www.mandriva.com/security/advisories?name=MDKSA-2003:038MANDRAKE
MDKSA-2003:039http://www.mandriva.com/security/advisories?name=MDKSA-2003:039MANDRAKE
RHSA-2003:103http://www.redhat.com/support/errata/RHSA-2003-103.htmlREDHAT
RHSA-2003:145http://www.redhat.com/support/errata/RHSA-2003-145.htmlREDHAT
oval:org.mitre.oval:def:254https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254OVAL