Vulnerability Name:

CVE-2004-0619 (CCN-16495)

Assigned:2004-06-23
Published:2004-06-23
Updated:2017-10-11
Summary:Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Wed Jun 23 2004 - 14:20:59 CDT
Linux Broadcom 5820 Cryptonet Driver Integer Overflow

Source: MITRE
Type: CNA
CVE-2004-0619

Source: BUGTRAQ
Type: UNKNOWN
20040623 Linux Broadcom 5820 Cryptonet Driver Integer Overflow

Source: CCN
Type: RHSA-2004-549
kernel security update

Source: CCN
Type: RHSA-2005-283
kernel security update

Source: CCN
Type: SA11936
Red Hat Linux Broadcom 5820 Cryptonet Driver Integer Overflow

Source: SECUNIA
Type: UNKNOWN
11936

Source: CCN
Type: CIAC Information Bulletin P-047
Red Hat Updated Kernel Packages

Source: CIAC
Type: UNKNOWN
P-047

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2004:549

Source: REDHAT
Type: UNKNOWN
RHSA-2005:283

Source: BID
Type: Vendor Advisory
10599

Source: CCN
Type: BID-10599
Linux Kernel Broadcom 5820 Cryptonet Driver Integer Overflow Vulnerability

Source: XF
Type: UNKNOWN
bcm5820-adddsabufbytes-integer-bo(16459)

Source: XF
Type: UNKNOWN
bcm5820-adddsabufbytes-integer-bo(16495)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9773

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:i386:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:i686:*:*:*:*:*
  • AND
  • cpe:/a:redhat:kernel:2.4.20-8:*:athlon:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:athlon_smp:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:i386:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:i386_src:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:i586:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:i586_smp:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:i686:*:*:*:*:*
  • OR cpe:/a:redhat:kernel:2.4.20-8:*:i686_smp:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:kernel:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:9773
    V
    Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.
    2013-04-29
    oval:com.redhat.rhsa:def:20040549
    P
    RHSA-2004:549: kernel security update (Important)
    2004-12-02
    BACK
    redhat fedora core core_1.0
    redhat linux 8.0
    redhat linux 8.0
    redhat linux 8.0
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    redhat kernel 2.4.20-8
    linux kernel *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3