Vulnerability Name: | CVE-2003-1161 (CCN-21034) | ||||||||
Assigned: | 2003-11-05 | ||||||||
Published: | 2003-11-05 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | exit.c in Linux kernel 2.6-test9-CVS, as stored on kernel.bkbits.net, was modified to contain a backdoor, which could allow local users to elevate their privileges by passing __WCLONE|__WALL to the sys_wait4 function. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2003-1161 Source: CCN Type: OSVDB ID: 53017 Linux Kernel exit.c on kernel.bkbits.net Trojaned Distribution Source: BID Type: UNKNOWN 8987 Source: CCN Type: BID-8987 Linux Kernel Trojan Horse Vulnerability Source: CCN Type: ussg.iu.edu Linux Kernel Archive BK2CVS problem Source: MLIST Type: UNKNOWN [linux-kernel] 20031105 BK2CVS problem Source: CCN Type: Linux-Kernel Archive Re: BK2CVS problem Source: MLIST Type: Exploit [linux-kernel] 20031105 Re: BK2CVS problem Source: MLIST Type: Exploit [linux-kernel] 20031105 Re: BK2CVS problem Source: XF Type: UNKNOWN kernel-exitc-gain-privileges(21034) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |