Vulnerability Name:

CVE-2003-0476 (CCN-12447)

Assigned:2003-06-26
Published:2003-06-26
Updated:2018-05-03
Summary:The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Thu Jun 26 2003 - 12:24:23 CDT
Linux 2.4.x execve() file read race vulnerability

Source: MITRE
Type: CNA
CVE-2003-0476

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:796
kernel

Source: BUGTRAQ
Type: UNKNOWN
20030626 Linux 2.4.x execve() file read race vulnerability

Source: CCN
Type: RHSA-2003-238
Updated 2.4 kernel fixes vulnerabilities

Source: CCN
Type: RHSA-2003-368
Updated IA64 kernel packages address security vulnerabilities

Source: CCN
Type: RHSA-2003-408
Updated kernel packages address security vulnerabilities

Source: CCN
Type: CIAC Information Bulletin N-122
Red Hat Updated 2.4 Kernel Fixes Vulnerabilities

Source: CCN
Type: CIAC Information Bulletin O-031
Red Hat Updated 2.4 Kernel Fixes Privilege Escalation Security Vulnerability

Source: CCN
Type: CIAC Information Bulletin O-043
Red Hat Updated Kernel Packages

Source: CCN
Type: CIAC Information Bulletin O-059
Debian Linux-Kernel-2.4.14-ia64 Vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-358

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-423

Source: DEBIAN
Type: DSA-358
linux-kernel-2.4.18 -- several vulnerabilities

Source: DEBIAN
Type: DSA-423
linux-kernel-2.4.17-ia64 -- several vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:074

Source: REDHAT
Type: UNKNOWN
RHSA-2003:238

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:368

Source: REDHAT
Type: UNKNOWN
RHSA-2003:408

Source: CCN
Type: BID-8042
Linux 2.4 Kernel execve() System Call Race Condition Vulnerability

Source: CCN
Type: BID-8233
Multiple Linux 2.4 Kernel Vulnerabilities

Source: XF
Type: UNKNOWN
linux-execve-gain-privileges(12447)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:327

Source: SUSE
Type: SUSE-SA:2003:034
kernel: local privilege escalation remote Denial of Service (DoS)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:532
    P
    DSA-358-4 -- linux-kernel-2.4.18 -- several vulnerabilities
    2016-07-01
    oval:org.opensuse.security:def:20030476
    V
    CVE-2003-0476
    2015-11-16
    oval:org.mitre.oval:def:327
    V
    Linux Kernel execve Read Access to Restricted File Descriptors
    2014-06-09
    oval:org.debian:def:358
    V
    several vulnerabilities
    2013-01-21
    oval:org.debian:def:423
    V
    several vulnerabilities
    2004-01-15
    BACK
    linux linux kernel 2.4.0
    linux linux kernel 2.4.0
    redhat linux 7.1
    suse suse linux 7.2
    redhat linux 7.2
    suse suse linux 7.3
    engardelinux secure linux -
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    engardelinux secure professional -
    suse suse linux office server *
    redhat linux 8.0
    suse suse email server 3.1
    suse suse linux 8.1
    suse linux enterprise server 8
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    suse suse linux 8.2
    conectiva linux 9.0
    redhat linux advanced workstation 2.1