Vulnerability Name:

CVE-2003-0247 (CCN-12158)

Assigned:2003-06-03
Published:2003-06-03
Updated:2017-10-11
Summary:Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops").
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2003-0247

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:702
kernel

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:796
kernel

Source: CCN
Type: RHSA-2003-187
Updated 2.4 kernel fixes vulnerabilities and driver bugs

Source: CCN
Type: RHSA-2003-190
Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities

Source: CCN
Type: RHSA-2003-195
kernel security update

Source: CCN
Type: RHSA-2003-198
kernel security update

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-311

Source: DEBIAN
Type: UNKNOWN
DSA-312

Source: DEBIAN
Type: UNKNOWN
DSA-332

Source: DEBIAN
Type: UNKNOWN
DSA-336

Source: DEBIAN
Type: UNKNOWN
DSA-442

Source: DEBIAN
Type: DSA-311
linux-kernel-2.4.18 -- several vulnerabilities

Source: DEBIAN
Type: DSA-312
kernel-patch-2.4.18-powerpc -- several vulnerabilities

Source: DEBIAN
Type: DSA-332
linux-kernel-2.4.17 -- several vulnerabilities

Source: DEBIAN
Type: DSA-336
linux-kernel-2.2.20 -- several vulnerabilities

Source: DEBIAN
Type: DSA-442
linux-kernel-2.4.17-s390 -- several vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:066

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:074

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:187

Source: REDHAT
Type: UNKNOWN
RHSA-2003:195

Source: REDHAT
Type: UNKNOWN
RHSA-2003:198

Source: CCN
Type: BID-7791
Linux TTY Layer Kernel Panic Denial Of Service Vulnerability

Source: CCN
Type: TLSA-2003-41
Multiple vulnerabilities in kernel

Source: TURBO
Type: UNKNOWN
TLSA-2003-41

Source: XF
Type: UNKNOWN
linux-kernel-tty-dos(12158)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:284

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:i386:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030247
    V
    CVE-2003-0247
    2015-11-16
    oval:org.mitre.oval:def:284
    V
    Linux Kernel TTY Vulnerability
    2007-04-25
    oval:org.debian:def:442
    V
    several vulnerabilities
    2004-02-19
    oval:org.debian:def:336
    V
    several vulnerabilities
    2003-06-29
    oval:org.debian:def:332
    V
    several vulnerabilities
    2003-06-27
    oval:org.debian:def:312
    V
    several vulnerabilities
    2003-06-09
    oval:org.debian:def:311
    V
    several vulnerabilities
    2003-06-08
    BACK
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3
    redhat linux 8.0
    redhat linux 9.0
    linux linux kernel 2.4.0
    redhat linux 7.1
    redhat linux 7.2
    engardelinux secure linux -
    mandrakesoft mandrake linux 8.2
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    engardelinux secure professional -
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    redhat enterprise linux 2.1
    conectiva linux 9.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 8.2
    mandrakesoft mandrake linux 9.1