Vulnerability Name:

CVE-2003-0248 (CCN-12159)

Assigned:2003-06-03
Published:2003-06-03
Updated:2017-10-11
Summary:The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2003-0248

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:702
kernel

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:796
kernel

Source: CCN
Type: RHSA-2003-187
Updated 2.4 kernel fixes vulnerabilities and driver bugs

Source: CCN
Type: RHSA-2003-195
kernel security update

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-311

Source: DEBIAN
Type: UNKNOWN
DSA-312

Source: DEBIAN
Type: UNKNOWN
DSA-332

Source: DEBIAN
Type: UNKNOWN
DSA-336

Source: DEBIAN
Type: UNKNOWN
DSA-442

Source: DEBIAN
Type: DSA-311
linux-kernel-2.4.18 -- several vulnerabilities

Source: DEBIAN
Type: DSA-312
kernel-patch-2.4.18-powerpc -- several vulnerabilities

Source: DEBIAN
Type: DSA-332
linux-kernel-2.4.17 -- several vulnerabilities

Source: DEBIAN
Type: DSA-336
linux-kernel-2.2.20 -- several vulnerabilities

Source: DEBIAN
Type: DSA-442
linux-kernel-2.4.17-s390 -- several vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:066

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:074

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:187

Source: REDHAT
Type: UNKNOWN
RHSA-2003:195

Source: CCN
Type: BID-7793
Linux Kernel FPU/SSE Environment Restoration MXCSR Register Corruption Vulnerability

Source: CCN
Type: TLSA-2003-41
Multiple vulnerabilities in kernel

Source: TURBO
Type: UNKNOWN
TLSA-2003-41

Source: XF
Type: UNKNOWN
linux-kernel-mxcsr-dos(12159)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:292

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:i386:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:292
    V
    Linux Kernel mxcsr Code Vulnerability
    2007-04-25
    oval:org.debian:def:442
    V
    several vulnerabilities
    2004-02-19
    oval:org.debian:def:336
    V
    several vulnerabilities
    2003-06-29
    oval:org.debian:def:332
    V
    several vulnerabilities
    2003-06-27
    oval:org.debian:def:312
    V
    several vulnerabilities
    2003-06-09
    oval:org.debian:def:311
    V
    several vulnerabilities
    2003-06-08
    BACK
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3
    redhat linux 8.0
    redhat linux 9.0
    linux linux kernel 2.4.0
    redhat linux 7.1
    redhat linux 7.2
    engardelinux secure linux -
    mandrakesoft mandrake linux 8.2
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    engardelinux secure professional -
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    conectiva linux 9.0
    mandrakesoft mandrake linux 8.2
    mandrakesoft mandrake linux 9.1