Vulnerability Name:

CVE-2004-0136 (CCN-16416)

Assigned:2004-06-14
Published:2004-06-14
Updated:2017-07-11
Summary:The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: SGI
Type: UNKNOWN
20040601-01-P

Source: CCN
Type: SGI Security Advisory 20040601
syssgi system call vulnerability and other security fixes

Source: MITRE
Type: CNA
CVE-2004-0136

Source: CCN
Type: SA11872
SGI IRIX Privilege Escalation and Denial of Service Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
11872

Source: CCN
Type: CIAC Information Bulletin O-167
SGI - System Call SGI_IOPROBE Vulnerability

Source: CCN
Type: CIAC Information Bulletin P-047
Red Hat Updated Kernel Packages

Source: OSVDB
Type: UNKNOWN
7123

Source: CCN
Type: OSVDB ID: 7123
IRIX mapelf32exec Function Local DoS

Source: BID
Type: Vendor Advisory
10547

Source: CCN
Type: BID-10547
SGI IRIX Undisclosed MapElf32Exec Local Denial Of Service Vulnerability

Source: XF
Type: UNKNOWN
irix-mapelf32exec-dos(16416)

Source: XF
Type: UNKNOWN
irix-mapelf32exec-dos(16416)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.22:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.23:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.24:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.25:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sgi:irix:6.5.24:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.22:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.23:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sgi irix 6.5.20f
    sgi irix 6.5.20m
    sgi irix 6.5.21f
    sgi irix 6.5.21m
    sgi irix 6.5.22
    sgi irix 6.5.23
    sgi irix 6.5.24
    sgi irix 6.5.25
    sgi irix 6.5.24
    sgi irix 6.5.22
    sgi irix 6.5.23
    sgi irix 6.5.21m
    sgi irix 6.5.21f
    sgi irix 6.5.20f
    sgi irix 6.5.20m
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3