CVE-2004-0077

Scores

EPSS

0.001very_low0.1%
0%20%40%60%80%100%

Percentile: 0.1%

CVSS

7.2high2.0
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

Exploits

Exploit ID: 154

Source: exploitdb

URL: https://www.exploit-db.com/exploits/154

Exploit ID: 160

Source: exploitdb

URL: https://www.exploit-db.com/exploits/160

Recommendations

Source: nvd

Users are encouraged to upgrade to the latest available sources for
their system:

# emerge sync
# emerge -pv your-favourite-sources
# emerge your-favourite-sources
# # Follow usual procedure for compiling and installing a kernel.
# # If you use genkernel, run genkernel as you would do normally.

# # IF YOUR KERNEL IS MARKED as “remerge required!” THEN
# # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
# # REPORTS THAT THE SAME VERSION IS INSTALLED.

URL: http://security.gentoo.org/glsa/glsa-200403-02.xml

Vulnerable Software (12)

Type: Configuration

Product: kernel

Operating System: rhel 3

Trait:
{  "fixed": "2.4.21-9.0.1.EL"}

Source: redhat

Type: Configuration

Product: kernel-source-2.2.20

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: kernel-source-2.4.27

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: s390utils

Operating System: rhel 3

Trait:
{  "fixed": "1.2.4-3"}

Source: redhat

Type: Configuration

Vendor: linux

Product: linux_kernel

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:redhat:kernel_source:2.4.20-8:*:i386_src:*:*:*:*:*",          "vulnerable": true        },        {         ...

Source: nvd

Type: Configuration

Vendor: netwosix

Product: netwosix_linux

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:redhat:kernel_source:2.4.20-8:*:i386_src:*:*:*:*:*",          "vulnerable": true        },        {         ...

Source: nvd

Type: Configuration

Vendor: redhat

Product: bigmem_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:bigmem_kernel:2.4.20-8:*:i686:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:redhat:kernel:2.4.20-8:*:athlo...

Source: nvd

Type: Configuration

Vendor: redhat

Product: kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:bigmem_kernel:2.4.20-8:*:i686:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:redhat:kernel:2.4.20-8:*:athlo...

Source: nvd

Type: Configuration

Vendor: redhat

Product: kernel

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:redhat:kernel_source:2.4.20-8:*:i386_src:*:*:*:*:*",          "vulnerable": true        },        {         ...

Source: nvd

Type: Configuration

Vendor: redhat

Product: kernel_doc

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:bigmem_kernel:2.4.20-8:*:i686:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:redhat:kernel:2.4.20-8:*:athlo...

Source: nvd