Vulnerability Name:

CVE-2004-0427 (CCN-16002)

Assigned:2004-04-08
Published:2004-04-08
Updated:2018-05-03
Summary:The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: SGI
Type: Patch, Vendor Advisory
20040504-01-U

Source: SGI
Type: Patch, Vendor Advisory
20040505-01-U

Source: MITRE
Type: CNA
CVE-2004-0427

Source: CONECTIVA
Type: UNKNOWN
CLA-2004:846

Source: CCN
Type: Conectiva Linux Announcement CLSA-2004:846
Fixes for kernel vulnerabilities

Source: FEDORA
Type: UNKNOWN
FEDORA-2004-111

Source: MISC
Type: UNKNOWN
http://linux.bkbits.net:8080/linux-2.4/cset@407bf20eDeeejm8t36_tpvSE-8EFHA

Source: MISC
Type: UNKNOWN
http://linux.bkbits.net:8080/linux-2.6/cset@407b1217x4jtqEkpFW2g_-RcF0726A

Source: CCN
Type: Fedora-Announce Mailing List, Thu, 22 Apr 2004 17:58:51 +0100
Updated kernel packages fix security issues.

Source: MLIST
Type: UNKNOWN
[linux-kernel] 20040408 [PATCH]: 2.4/2.6 do_fork() error path memory leak

Source: CCN
Type: RHSA-2004-255
kernel security update

Source: CCN
Type: RHSA-2004-327
kernel security update

Source: CCN
Type: SA11429
Linux Kernel setsockopt MCAST_MSFILTER Integer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
11429

Source: CCN
Type: SA11464
Linux Kernel CPUFREQ Proc Handler Kernel Memory Disclosure Vulnerability

Source: SECUNIA
Type: UNKNOWN
11464

Source: CCN
Type: SA11486
Linux Kernel Framebuffer Driver Direct Userspace Access Vulnerability

Source: SECUNIA
Type: UNKNOWN
11486

Source: SECUNIA
Type: UNKNOWN
11541

Source: CCN
Type: SA11861
Linux Kernel "__clear_fpu()" Macro Denial of Service Vulnerability

Source: SECUNIA
Type: UNKNOWN
11861

Source: CCN
Type: SA11891
Linux Kernel Various Drivers Userland Pointer Dereference Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
11891

Source: SECUNIA
Type: UNKNOWN
11892

Source: SECUNIA
Type: UNKNOWN
20162

Source: SECUNIA
Type: UNKNOWN
20163

Source: SECUNIA
Type: UNKNOWN
20202

Source: SECUNIA
Type: UNKNOWN
20338

Source: GENTOO
Type: UNKNOWN
GLSA-200407-02

Source: CCN
Type: CIAC Information Bulletin O-164
Red Hat Updated Kernel Packages Fix Security Vulnerabilities

Source: CIAC
Type: UNKNOWN
O-164

Source: DEBIAN
Type: UNKNOWN
DSA-1067

Source: DEBIAN
Type: UNKNOWN
DSA-1069

Source: DEBIAN
Type: UNKNOWN
DSA-1070

Source: DEBIAN
Type: UNKNOWN
DSA-1082

Source: DEBIAN
Type: DSA-1067
kernel-source-2.4.16 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1069
kernel-source-2.4.18 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1070
kernel-source-2.4.19 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1082
kernel-source-2.4.17 -- several vulnerabilities

Source: CCN
Type: GLSA-200407-02
Linux Kernel: Multiple vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2004:037

Source: SUSE
Type: UNKNOWN
SuSE-SA:2004:010

Source: REDHAT
Type: UNKNOWN
RHSA-2004:255

Source: REDHAT
Type: UNKNOWN
RHSA-2004:260

Source: REDHAT
Type: UNKNOWN
RHSA-2004:327

Source: BID
Type: UNKNOWN
10221

Source: CCN
Type: BID-10221
Linux kernel do_fork() Memory Leakage Vulnerability

Source: CCN
Type: TLSA-2004-14
Multiple vulnerabilities within the kernel

Source: TURBO
Type: UNKNOWN
TLSA-2004-14

Source: XF
Type: UNKNOWN
linux-dofork-memory-leak(16002)

Source: XF
Type: UNKNOWN
linux-dofork-memory-leak(16002)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10297

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:2819

Source: SUSE
Type: SUSE-SA:2004:010
Linux Kernel: privilege escalation local DoS

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.23:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora_core:1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10297
    V
    The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.
    2013-04-29
    oval:org.debian:def:1082
    V
    several vulnerabilities
    2006-05-29
    oval:org.debian:def:1070
    V
    several vulnerabilities
    2006-05-21
    oval:org.debian:def:1067
    V
    several vulnerabilities
    2006-05-20
    oval:org.debian:def:1069
    V
    several vulnerabilities
    2006-05-20
    oval:org.mitre.oval:def:2819
    V
    Denial of Service Vulnerability in Linux Kernel do_fork Function via CLONE_VM
    2004-10-06
    oval:com.redhat.rhsa:def:20040255
    P
    RHSA-2004:255: kernel security update (Important)
    2004-06-17
    BACK
    linux linux kernel 2.4.0
    linux linux kernel 2.6.0
    linux linux kernel 2.4.3
    linux linux kernel 2.4.4
    linux linux kernel 2.4.5
    linux linux kernel 2.4.6
    linux linux kernel 2.4.18
    linux linux kernel 2.4.20
    linux linux kernel 2.4.22
    linux linux kernel 2.4.7
    linux linux kernel 2.4.21
    linux linux kernel 2.4.0
    linux linux kernel 2.4.1
    linux linux kernel 2.4.10
    linux linux kernel 2.4.11
    linux linux kernel 2.4.12
    linux linux kernel 2.4.13
    linux linux kernel 2.4.14
    linux linux kernel 2.4.15
    linux linux kernel 2.4.16
    linux linux kernel 2.4.17
    linux linux kernel 2.4.19
    linux linux kernel 2.4.2
    linux linux kernel 2.4.23
    linux linux kernel 2.4.24
    linux linux kernel 2.4.25
    linux linux kernel 2.4.8
    linux linux kernel 2.4.9
    linux linux kernel 2.6.2
    linux linux kernel 2.6.0
    linux linux kernel 2.6.1
    linux linux kernel 2.6.3
    linux linux kernel 2.6.4
    linux linux kernel 2.6.5
    redhat linux 3.0
    suse suse linux database server *
    suse suse linux connectivity server *
    conectiva linux 8.0
    debian debian linux 3.0
    gentoo linux *
    suse suse linux office server *
    suse suse linux 8.1
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    conectiva linux 9.0
    suse suse linux 9.0
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    fedoraproject fedora core 1
    mandrakesoft mandrake linux 10.0
    redhat enterprise linux 3
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux corporate server 2.1