Vulnerability Name:

CVE-2003-0961 (CCN-13880)

Assigned:2003-12-01
Published:2003-12-01
Updated:2016-10-18
Summary:Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: SGI Security Advisory 20031201-01-A
do_brk() vulnerability on SGI Altix systems

Source: CCN
Type: VulnWatch Mailing List, Mon Dec 01 2003 - 17:41:18 CST
Linux kernel do_brk() lacks argument bound checking

Source: MITRE
Type: CNA
CVE-2003-0961

Source: CONECTIVA
Type: UNKNOWN
CLA-2003:796

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:796
kernel

Source: MISC
Type: UNKNOWN
http://isec.pl/papers/linux_kernel_do_brk.pdf

Source: BUGTRAQ
Type: UNKNOWN
20031204 [iSEC] Linux kernel do_brk() vulnerability details

Source: BUGTRAQ
Type: UNKNOWN
20031204 Hot fix for do_brk bug

Source: BUGTRAQ
Type: UNKNOWN
20040112 SmoothWall Project Security Advisory SWP-2004:001

Source: CCN
Type: RHSA-2003-368
Updated IA64 kernel packages address security vulnerabilities

Source: CCN
Type: RHSA-2003-389
kernel security update

Source: CCN
Type: RHSA-2003-392
Updated 2.4 kernel fixes privilege escalation security vulnerability

Source: CCN
Type: SA10328
Linux Kernel "do_brk()" Privilege Escalation Vulnerability

Source: SECUNIA
Type: UNKNOWN
10328

Source: SECUNIA
Type: UNKNOWN
10329

Source: SECUNIA
Type: UNKNOWN
10330

Source: SECUNIA
Type: UNKNOWN
10333

Source: SECUNIA
Type: UNKNOWN
10338

Source: CCN
Type: SmoothWall Project Security Advisory SWP-2004:001
Updates for SmoothWall Express to correct local vulnerabilities in Linux kernel

Source: CCN
Type: CIAC Information Bulletin O-059
Debian Linux-Kernel-2.4.14-ia64 Vulnerabilities

Source: CCN
Type: CIAC Information Bulletin O-071
Debian kernel-patch-2.4.17-mips Interger Overflow

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-403

Source: DEBIAN
Type: UNKNOWN
DSA-417

Source: DEBIAN
Type: UNKNOWN
DSA-423

Source: DEBIAN
Type: UNKNOWN
DSA-433

Source: DEBIAN
Type: UNKNOWN
DSA-439

Source: DEBIAN
Type: UNKNOWN
DSA-440

Source: DEBIAN
Type: UNKNOWN
DSA-442

Source: DEBIAN
Type: UNKNOWN
DSA-450

Source: DEBIAN
Type: UNKNOWN
DSA-470

Source: DEBIAN
Type: UNKNOWN
DSA-475

Source: DEBIAN
Type: DSA-403
kernel-source-2.4.18 -- local root exploit

Source: DEBIAN
Type: DSA-417
linux-kernel-2.4.18-powerpc+alpha -- missing boundary check

Source: DEBIAN
Type: DSA-423
linux-kernel-2.4.17-ia64 -- several vulnerabilities

Source: DEBIAN
Type: DSA-433
kernel-patch-2.4.17-mips -- integer overflow

Source: DEBIAN
Type: DSA-439
linux-kernel-2.4.16-arm -- several vulnerabilities

Source: DEBIAN
Type: DSA-440
linux-kernel-2.4.17-powerpc-apus -- several vulnerabilities

Source: DEBIAN
Type: DSA-442
linux-kernel-2.4.17-s390 -- several vulnerabilities

Source: DEBIAN
Type: DSA-450
linux-kernel-2.4.19-mips -- several vulnerabilities

Source: DEBIAN
Type: DSA-470
linux-kernel-2.4.17-hppa -- several vulnerabilities

Source: DEBIAN
Type: DSA-475
linux-kernel-2.4.18-hppa -- several vulnerabilities

Source: CCN
Type: US-CERT VU#301156
Linux kernel do_brk() function contains integer overflow

Source: CERT-VN
Type: US Government Resource
VU#301156

Source: CCN
Type: Linux kernel Web site
The Linux Kernel Archives

Source: CCN
Type: Trustix Secure Linux Bugfix Advisory #2003-0046
kernel

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:110

Source: SUSE
Type: UNKNOWN
SuSE-SA:2003:049

Source: REDHAT
Type: UNKNOWN
RHSA-2003:368

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:389

Source: CCN
Type: BID-9138
Linux Kernel do_brk Function Boundary Condition Vulnerability

Source: CCN
Type: slackware-security Mailing List, Tue, 2 Dec 2003 11:21:22 -0800 (PST)
minor advisory typo (SSA:2003-336-01b)

Source: CCN
Type: slackware-security Mailing List, Tue, 2 Dec 2003 10:05:30 -0800 (PST)
Kernel security update (SSA:2003-336-01)

Source: CCN
Type: TLSA-2003-65
Integer overflow

Source: XF
Type: UNKNOWN
linux-dobrk-gain-privileges(13880)

Source: SUSE
Type: SUSE-SA:2003:049
Kernel brk() vulnerability: local root exploit

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version <= 2.4.22)

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030961
    V
    CVE-2003-0961
    2015-11-16
    oval:org.debian:def:475
    V
    several vulnerabilities
    2004-04-05
    oval:org.debian:def:470
    V
    several vulnerabilities
    2004-04-01
    oval:org.debian:def:450
    V
    several vulnerabilities
    2004-02-27
    oval:org.debian:def:442
    V
    several vulnerabilities
    2004-02-19
    oval:org.debian:def:439
    V
    several vulnerabilities
    2004-02-18
    oval:org.debian:def:440
    V
    several vulnerabilities
    2004-02-18
    oval:org.debian:def:433
    V
    integer overflow
    2004-02-04
    oval:org.debian:def:423
    V
    several vulnerabilities
    2004-01-15
    oval:org.debian:def:417
    V
    missing boundary check
    2004-01-07
    oval:org.debian:def:403
    V
    local root exploit
    2003-12-01
    BACK
    linux linux kernel *
    linux linux kernel 2.4.3
    linux linux kernel 2.4.4
    linux linux kernel 2.4.5
    linux linux kernel 2.4.6
    linux linux kernel 2.4.18
    linux linux kernel 2.4.20
    linux linux kernel 2.4.22
    linux linux kernel 2.4.7
    linux linux kernel 2.4.21
    linux linux kernel 2.4.0
    linux linux kernel 2.4.1
    linux linux kernel 2.4.10
    linux linux kernel 2.4.11
    linux linux kernel 2.4.12
    linux linux kernel 2.4.13
    linux linux kernel 2.4.14
    linux linux kernel 2.4.15
    linux linux kernel 2.4.16
    linux linux kernel 2.4.17
    linux linux kernel 2.4.19
    linux linux kernel 2.4.2
    linux linux kernel 2.4.8
    linux linux kernel 2.4.9
    redhat linux 7.1
    redhat linux 7.2
    suse suse linux 7.3
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    suse suse linux office server *
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    suse suse email server 3.1
    suse suse linux 8.1
    mandrakesoft mandrake multi network firewall 8.2
    slackware slackware linux current
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    suse suse linux 8.2
    conectiva linux 9.0
    trustix secure linux 2.0
    slackware slackware linux 9.1
    suse suse linux 9.0
    suse suse linux school server -
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux corporate server 2.1