CVE-2004-0109

Current Description

Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.

Basic Data

PublishedJune 01, 2004
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score4.6
SeverityMEDIUM
Exploitability Score3.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel2.4.0*******
    2.3OSLinuxLinux Kernel2.5.0*******
    2.3OSLinuxLinux Kernel2.6.0*******

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel 2.4.0, 2.5.0, 2.6.0

References

NameSourceURLTags
20040405-01-Uftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.ascSGIPATCH Vendor Advisory
20040504-01-Uftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.ascSGI
CLA-2004:846http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846CONECTIVA
2004-0020http://marc.info/?l=bugtraq&m=108213675028441&w=2TRUSTIX
RHSA-2004:166http://rhn.redhat.com/errata/RHSA-2004-166.htmlREDHATPATCH Vendor Advisory
11361http://secunia.com/advisories/11361SECUNIA
11362http://secunia.com/advisories/11362SECUNIA
11373http://secunia.com/advisories/11373SECUNIA
11429http://secunia.com/advisories/11429SECUNIA
11464http://secunia.com/advisories/11464SECUNIA
11469http://secunia.com/advisories/11469SECUNIA
11470http://secunia.com/advisories/11470SECUNIA
11486http://secunia.com/advisories/11486SECUNIA
11494http://secunia.com/advisories/11494SECUNIA
11518http://secunia.com/advisories/11518SECUNIA
11626http://secunia.com/advisories/11626SECUNIA
11861http://secunia.com/advisories/11861SECUNIA
11891http://secunia.com/advisories/11891SECUNIA
11986http://secunia.com/advisories/11986SECUNIA
12003http://secunia.com/advisories/12003SECUNIA
GLSA-200407-02http://security.gentoo.org/glsa/glsa-200407-02.xmlGENTOO
O-121http://www.ciac.org/ciac/bulletins/o-121.shtmlCIAC
O-127http://www.ciac.org/ciac/bulletins/o-127.shtmlCIAC
DSA-479http://www.debian.org/security/2004/dsa-479DEBIAN
DSA-480http://www.debian.org/security/2004/dsa-480DEBIAN
DSA-481http://www.debian.org/security/2004/dsa-481DEBIAN
DSA-482http://www.debian.org/security/2004/dsa-482DEBIAN
DSA-489http://www.debian.org/security/2004/dsa-489DEBIAN
DSA-491http://www.debian.org/security/2004/dsa-491DEBIAN
DSA-495http://www.debian.org/security/2004/dsa-495DEBIAN
http://www.idefense.com/application/poi/display?id=101&type=vulnerabilitieshttp://www.idefense.com/application/poi/display?id=101&type=vulnerabilitiesMISCVendor Advisory
ESA-20040428-004http://www.linuxsecurity.com/advisories/engarde_advisory-4285.htmlENGARDEPATCH Vendor Advisory
MDKSA-2004:029http://www.mandriva.com/security/advisories?name=MDKSA-2004:029MANDRAKE
SuSE-SA:2004:009http://www.novell.com/linux/security/advisories/2004_09_kernel.htmlSUSE
RHSA-2004:105http://www.redhat.com/support/errata/RHSA-2004-105.htmlREDHAT
RHSA-2004:106http://www.redhat.com/support/errata/RHSA-2004-106.htmlREDHAT
RHSA-2004:183http://www.redhat.com/support/errata/RHSA-2004-183.htmlREDHAT
10141http://www.securityfocus.com/bid/10141BID
TLSA-2004-14http://www.turbolinux.com/security/2004/TLSA-2004-14.txtTURBO
linux-iso9660-bo(15866)https://exchange.xforce.ibmcloud.com/vulnerabilities/15866XF
oval:org.mitre.oval:def:10733https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733OVAL
oval:org.mitre.oval:def:940https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940OVAL