CVE-2004-0495

Scores

EPSS

0.001very_low0.1%
0%20%40%60%80%100%

Percentile: 0.1%

CVSS

7.2high2.0
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

Related Vulnerabilities

Exploits

Exploit ID: 12

Source: exploitdb

URL: https://www.exploit-db.com/exploits/12

Exploit ID: 129

Source: exploitdb

URL: https://www.exploit-db.com/exploits/129

Exploit ID: 131

Source: exploitdb

URL: https://www.exploit-db.com/exploits/131

Exploit ID: 141

Source: exploitdb

URL: https://www.exploit-db.com/exploits/141

Exploit ID: 142

Source: exploitdb

URL: https://www.exploit-db.com/exploits/142

Exploit ID: 145

Source: exploitdb

URL: https://www.exploit-db.com/exploits/145

Exploit ID: 154

Source: exploitdb

URL: https://www.exploit-db.com/exploits/154

Exploit ID: 160

Source: exploitdb

URL: https://www.exploit-db.com/exploits/160

Exploit ID: 20004

Source: exploitdb

URL: https://www.exploit-db.com/exploits/20004

Exploit ID: 21124

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21124

Exploit ID: 21141

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21141

Exploit ID: 21242

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21242

Exploit ID: 22105

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22105

Exploit ID: 22131

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22131

Exploit ID: 22362

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22362

Exploit ID: 22363

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22363

Exploit ID: 22640

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22640

Exploit ID: 22813

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22813

Exploit ID: 22840

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22840

Exploit ID: 24043

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24043

Exploit ID: 24078

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24078

Exploit ID: 24777

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24777

Exploit ID: 26076

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26076

Exploit ID: 26248

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26248

Exploit ID: 26353

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26353

Exploit ID: 26382

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26382

Exploit ID: 26489

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26489

Exploit ID: 26648

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26648

Exploit ID: 26749

Source: exploitdb

URL: https://www.exploit-db.com/exploits/26749

Exploit ID: 27031

Source: exploitdb

URL: https://www.exploit-db.com/exploits/27031

Exploit ID: 3

Source: exploitdb

URL: https://www.exploit-db.com/exploits/3

Exploit ID: 306

Source: exploitdb

URL: https://www.exploit-db.com/exploits/306

Exploit ID: 3555

Source: exploitdb

URL: https://www.exploit-db.com/exploits/3555

Exploit ID: 398

Source: exploitdb

URL: https://www.exploit-db.com/exploits/398

Exploit ID: 399

Source: exploitdb

URL: https://www.exploit-db.com/exploits/399

Exploit ID: 624

Source: exploitdb

URL: https://www.exploit-db.com/exploits/624

Exploit ID: 68

Source: exploitdb

URL: https://www.exploit-db.com/exploits/68

Exploit ID: 685

Source: exploitdb

URL: https://www.exploit-db.com/exploits/685

Exploit ID: 690

Source: exploitdb

URL: https://www.exploit-db.com/exploits/690

Exploit ID: 692

Source: exploitdb

URL: https://www.exploit-db.com/exploits/692

Exploit ID: 744

Source: exploitdb

URL: https://www.exploit-db.com/exploits/744

Exploit ID: 778

Source: exploitdb

URL: https://www.exploit-db.com/exploits/778

Exploit ID: 895

Source: exploitdb

URL: https://www.exploit-db.com/exploits/895

Exploit ID: 9363

Source: exploitdb

URL: https://www.exploit-db.com/exploits/9363

Recommendations

Source: nvd

Users are encouraged to upgrade to the latest available sources for
their system:

# emerge sync
# emerge -pv your-favorite-sources
# emerge your-favorite-sources

# # Follow usual procedure for compiling and installing a kernel.
# # If you use genkernel, run genkernel as you would do normally.

URL: http://security.gentoo.org/glsa/glsa-200407-02.xml

Vulnerable Software (20)

Type: Configuration

Product: kernel

Operating System: rhel 3

Trait:
{  "fixed": "2.4.21-15.0.2.EL"}

Source: redhat

Type: Configuration

Product: kernel-source-2.4.27

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: converged_communications_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messagi...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messagi...

Source: nvd

Type: Configuration

Vendor: *

Product: intuity_audix

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: linux_distro

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messagi...

Source: nvd

Type: Configuration

Vendor: *

Product: linux_distro

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messagi...

Source: nvd

Type: Configuration

Vendor: *

Product: modular_messaging_message_storage_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messagi...

Source: nvd

Type: Configuration

Vendor: *

Product: s8300

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: s8500

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: s8700

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_email_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messagi...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_linux_admin-cd_for_firewall

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_linux_connectivity_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_linux_database_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_linux_firewall_cd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_linux_office_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: suse_office_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*...

Source: nvd

End of list