CVE-2004-1151

Current Description

Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.

Basic Data

PublishedJanuary 10, 2005
Last ModifiedOctober 18, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel2.6.0*******
    2.3OSLinuxLinux Kernel2.6.0test1******
    2.3OSLinuxLinux Kernel2.6.0test10******
    2.3OSLinuxLinux Kernel2.6.0test11******
    2.3OSLinuxLinux Kernel2.6.0test2******
    2.3OSLinuxLinux Kernel2.6.0test3******
    2.3OSLinuxLinux Kernel2.6.0test4******
    2.3OSLinuxLinux Kernel2.6.0test5******
    2.3OSLinuxLinux Kernel2.6.0test6******
    2.3OSLinuxLinux Kernel2.6.0test7******
    2.3OSLinuxLinux Kernel2.6.0test8******
    2.3OSLinuxLinux Kernel2.6.0test9******
    2.3OSLinuxLinux Kernel2.6.1*******
    2.3OSLinuxLinux Kernel2.6.1rc1******
    2.3OSLinuxLinux Kernel2.6.1rc2******
    2.3OSLinuxLinux Kernel2.6.2*******
    2.3OSLinuxLinux Kernel2.6.3*******
    2.3OSLinuxLinux Kernel2.6.4*******
    2.3OSLinuxLinux Kernel2.6.5*******
    2.3OSLinuxLinux Kernel2.6.6*******
    2.3OSLinuxLinux Kernel2.6.6rc1******
    2.3OSLinuxLinux Kernel2.6.7*******
    2.3OSLinuxLinux Kernel2.6.7rc1******
    2.3OSLinuxLinux Kernel2.6.8*******
    2.3OSLinuxLinux Kernel2.6.8rc1******
    2.3OSLinuxLinux Kernel2.6.8rc2******
    2.3OSLinuxLinux Kernel2.6.8rc3******
    2.3OSLinuxLinux Kernel2.6.92.6.20******
    2.3OSLinuxLinux Kernel2.6.10rc2******
    2.3OSLinuxLinux Kernel2.6_test9_cvs*******
    2.3OSUbuntuUbuntu Linux4.1*ia64*****
    2.3OSUbuntuUbuntu Linux4.1*ppc*****

Vulnerable Software List

VendorProductVersions
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.6.0, 2.6.1, 2.6.10, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6_test9_cvs

References

NameSourceURLTags
http://linux.bkbits.net:8080/linux-2.6/cset@1.2079http://linux.bkbits.net:8080/linux-2.6/cset@1.2079MISC
http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQhttp://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQMISC
20041214 [USN-38-1] Linux kernel vulnerabilitieshttp://marc.info/?l=bugtraq&m=110306397320336&w=2BUGTRAQ
MDKSA-2005:022http://www.mandriva.com/security/advisories?name=MDKSA-2005:022MANDRAKE
SUSE-SA:2004:044http://www.novell.com/linux/security/advisories/2004_44_kernel.htmlSUSE
[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.htmlMLIST