CVE-2004-0554

Current Description

Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program.

Basic Data

PublishedAugust 06, 2004
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3HardwareAvayaConverged Communications Server2.0*******
    2.3OSAvayaModular Messaging Message Storage Servers3400*******
    2.3OSGentooLinux1.4*******
    2.3OSLinuxLinux Kernel2.4.18*******
    2.3OSLinuxLinux Kernel2.4.19*******
    2.3OSLinuxLinux Kernel2.4.21*******
    2.3OSLinuxLinux Kernel2.4.22*******
    2.3OSLinuxLinux Kernel2.4.23*******
    2.3OSLinuxLinux Kernel2.4.24*******
    2.3OSLinuxLinux Kernel2.4.25*******
    2.3OSLinuxLinux Kernel2.4.26*******
    2.3OSLinuxLinux Kernel2.6.0*******
    2.3OSLinuxLinux Kernel2.6.1*******
    2.3OSLinuxLinux Kernel2.6.1rc1******
    2.3OSLinuxLinux Kernel2.6.1rc2******
    2.3OSLinuxLinux Kernel2.6.2*******
    2.3OSLinuxLinux Kernel2.6.3*******
    2.3OSLinuxLinux Kernel2.6.4*******
    2.3OSLinuxLinux Kernel2.6.5*******
    2.3OSLinuxLinux Kernel2.6.6*******
    2.3OSLinuxLinux Kernel2.6.6rc1******
    2.3OSLinuxLinux Kernel2.6.7*******
    2.3OSLinuxLinux Kernel2.6.7rc1******
    2.3OSRedhatEnterprise Linux2.1*advanced_server*****
    2.3OSRedhatEnterprise Linux2.1*enterprise_server*****
    2.3OSRedhatEnterprise Linux2.1*workstation*****
    2.3OSRedhatEnterprise Linux3.0*advanced_servers*****
    2.3OSRedhatEnterprise Linux3.0*enterprise_server*****
    2.3OSRedhatEnterprise Linux3.0*workstation*****
    2.3OSSuseSuse Linux7*enterprise_server*****
    2.3OSSuseSuse Linux8*enterprise_server*****
    2.3OSSuseSuse Linux8.0*******
    2.3OSSuseSuse Linux8.0*i386*****
    2.3OSSuseSuse Linux8.1*******
    2.3OSSuseSuse Linux8.2*******
    2.3OSSuseSuse Linux9.0*******
    2.3OSSuseSuse Linux9.0*x86_64*****
    2.3OSSuseSuse Linux9.1*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAvayaIntuity Audix**lx*****
    2.3ApplicationSuseSuse Email Server3.1*******
    2.3ApplicationSuseSuse Email Serveriii*******
    2.3ApplicationSuseSuse Linux Admin-cd For Firewall********
    2.3ApplicationSuseSuse Linux Connectivity Server********
    2.3ApplicationSuseSuse Linux Database Server********
    2.3ApplicationSuseSuse Linux Firewall Cd********
    2.3ApplicationSuseSuse Linux Office Server********
    2.3ApplicationSuseSuse Office Server********
    2.3HardwareAvayaS8300r2.0.0*******
    2.3HardwareAvayaS8300r2.0.1*******
    2.3HardwareAvayaS8500r2.0.0*******
    2.3HardwareAvayaS8500r2.0.1*******
    2.3HardwareAvayaS8700r2.0.0*******
    2.3HardwareAvayaS8700r2.0.1*******
    2.3OSConectivaLinux8.0*******
    2.3OSConectivaLinux9.0*******

Vulnerable Software List

VendorProductVersions
Avaya S8300 r2.0.0, r2.0.1
Avaya Intuity Audix *
Avaya S8500 r2.0.0, r2.0.1
Avaya S8700 r2.0.0, r2.0.1
Avaya Modular Messaging Message Storage Server s3400
Avaya Converged Communications Server 2.0
Redhat Enterprise Linux 2.1, 3.0
Conectiva Linux 8.0, 9.0
Linux Linux Kernel 2.4.18, 2.4.19, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7
Suse Suse Linux Office Server *
Suse Suse Office Server *
Suse Suse Linux 7, 8, 8.0, 8.1, 8.2, 9.0, 9.1
Suse Suse Email Server 3.1, iii
Suse Suse Linux Admin-cd For Firewall *
Suse Suse Linux Connectivity Server *
Suse Suse Linux Database Server *
Suse Suse Linux Firewall Cd *
Gentoo Linux 1.4

References

NameSourceURLTags
CLA-2004:845http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845CONECTIVA
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905MISC
http://linuxreviews.org/news/2004-06-11_kernel_crash/index.htmlhttp://linuxreviews.org/news/2004-06-11_kernel_crash/index.htmlMISC
FEDORA-2004-186http://lwn.net/Articles/91155/FEDORA
20040620 TSSA-2004-011 - kernelhttp://marc.info/?l=bugtraq&m=108786114032681&w=2BUGTRAQ
ESA-20040621-005http://marc.info/?l=bugtraq&m=108793699910896&w=2ENGARDE
[linux-kernel] 20040609 timer + fpu stuff locks my console racehttp://marc.info/?l=linux-kernel&m=108681568931323&w=2MLIST
20162http://secunia.com/advisories/20162SECUNIA
20163http://secunia.com/advisories/20163SECUNIA
20202http://secunia.com/advisories/20202SECUNIA
20338http://secunia.com/advisories/20338SECUNIA
GLSA-200407-02http://security.gentoo.org/glsa/glsa-200407-02.xmlGENTOO
DSA-1067http://www.debian.org/security/2006/dsa-1067DEBIAN
DSA-1069http://www.debian.org/security/2006/dsa-1069DEBIAN
DSA-1070http://www.debian.org/security/2006/dsa-1070DEBIAN
DSA-1082http://www.debian.org/security/2006/dsa-1082DEBIAN
VU#973654http://www.kb.cert.org/vuls/id/973654CERT-VNThird Party Advisory US Government Resource
MDKSA-2004:062http://www.mandriva.com/security/advisories?name=MDKSA-2004:062MANDRAKE
SuSE-SA:2004:017http://www.novell.com/linux/security/advisories/2004_17_kernel.htmlSUSE
RHSA-2004:255http://www.redhat.com/support/errata/RHSA-2004-255.htmlREDHAT
RHSA-2004:260http://www.redhat.com/support/errata/RHSA-2004-260.htmlREDHAT
10538http://www.securityfocus.com/bid/10538BID
2004-0034http://www.trustix.net/errata/2004/0034/TRUSTIX
linux-dos(16412)https://exchange.xforce.ibmcloud.com/vulnerabilities/16412XF
oval:org.mitre.oval:def:2915https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915OVAL
oval:org.mitre.oval:def:9426https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426OVAL