fkie_cve-2004-0109
Vulnerability from fkie_nvd
Published
2004-06-01 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.ascPatch, Vendor Advisory
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108213675028441&w=2
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2004-166.htmlPatch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/11361
cve@mitre.orghttp://secunia.com/advisories/11362
cve@mitre.orghttp://secunia.com/advisories/11373
cve@mitre.orghttp://secunia.com/advisories/11429
cve@mitre.orghttp://secunia.com/advisories/11464
cve@mitre.orghttp://secunia.com/advisories/11469
cve@mitre.orghttp://secunia.com/advisories/11470
cve@mitre.orghttp://secunia.com/advisories/11486
cve@mitre.orghttp://secunia.com/advisories/11494
cve@mitre.orghttp://secunia.com/advisories/11518
cve@mitre.orghttp://secunia.com/advisories/11626
cve@mitre.orghttp://secunia.com/advisories/11861
cve@mitre.orghttp://secunia.com/advisories/11891
cve@mitre.orghttp://secunia.com/advisories/11986
cve@mitre.orghttp://secunia.com/advisories/12003
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200407-02.xml
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/o-121.shtml
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/o-127.shtml
cve@mitre.orghttp://www.debian.org/security/2004/dsa-479
cve@mitre.orghttp://www.debian.org/security/2004/dsa-480
cve@mitre.orghttp://www.debian.org/security/2004/dsa-481
cve@mitre.orghttp://www.debian.org/security/2004/dsa-482
cve@mitre.orghttp://www.debian.org/security/2004/dsa-489
cve@mitre.orghttp://www.debian.org/security/2004/dsa-491
cve@mitre.orghttp://www.debian.org/security/2004/dsa-495
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=101&type=vulnerabilitiesVendor Advisory
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-4285.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:029
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_09_kernel.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-105.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-106.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-183.html
cve@mitre.orghttp://www.securityfocus.com/bid/10141
cve@mitre.orghttp://www.turbolinux.com/security/2004/TLSA-2004-14.txt
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15866
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.ascPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108213675028441&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2004-166.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11361
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11362
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11373
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11429
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11464
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11469
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11470
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11486
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11494
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11518
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11626
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11861
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11891
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11986
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/12003
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200407-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/o-121.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/o-127.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-479
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-480
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-481
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-482
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-489
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-491
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-495
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=101&type=vulnerabilitiesVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-4285.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:029
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_09_kernel.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-105.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-106.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-183.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/10141
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.com/security/2004/TLSA-2004-14.txt
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15866
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940
Impacted products
Vendor Product Version
linux linux_kernel 2.4.0
linux linux_kernel 2.5.0
linux linux_kernel 2.6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F04081-D672-488E-A91D-5088DD04AA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en el componente de sistema de ficheros ISO9660 del kernel de Linux 2.4.x y 2.6.x  permite a usuarios locales con acceso f\u00edsico desbordar memoria del kernel y ejecutar c\u00f3digo arbitrario mediante un CD malformado con un una entrada de enlace simb\u00f3lico larga."
    }
  ],
  "id": "CVE-2004-0109",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-06-01T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11361"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11362"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11373"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11429"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11464"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11469"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11470"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11486"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11494"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11518"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11626"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11861"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11891"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/11986"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/12003"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-480"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-481"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-482"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-489"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-491"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2004/dsa-495"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=101\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2004_09_kernel.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-105.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-106.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-183.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/10141"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.com/security/2004/TLSA-2004-14.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15866"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11373"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11469"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11486"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/11986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/12003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-481"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-489"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2004/dsa-495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=101\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2004_09_kernel.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-105.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-106.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-183.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/10141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.com/security/2004/TLSA-2004-14.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15866"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…