Vulnerability Name:

CVE-2004-0602 (CCN-16558)

Assigned:2004-07-01
Published:2004-07-01
Updated:2017-07-11
Summary:The binary compatibility mode for FreeBSD 4.x and 5.x does not properly handle certain Linux system calls, which could allow local users to access kernel memory to gain privileges or cause a system panic.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: FREEBSD
Type: Patch, Vendor Advisory
FreeBSD-SA-04:13

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-04:13.linux
Linux binary compatibility mode input validation error

Source: MITRE
Type: CNA
CVE-2004-0602

Source: CCN
Type: OSVDB ID: 7330
FreeBSD Linux Compatibility Mode Improper System Call Handling Arbitrary Kernel Memory Access

Source: BID
Type: Vendor Advisory
10643

Source: CCN
Type: BID-10643
FreeBSD Linux Binary Compatibility Memory Access Vulnerability

Source: XF
Type: UNKNOWN
freebsd-binary-information-disclosure(16558)

Source: XF
Type: UNKNOWN
freebsd-binary-information-disclosure(16558)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.9:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.10:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 4.0
    freebsd freebsd 5.0
    freebsd freebsd 4.0
    freebsd freebsd 4.0 alpha
    freebsd freebsd 5.0 alpha
    freebsd freebsd 5.0
    freebsd freebsd 4.1.1
    freebsd freebsd 4.1
    freebsd freebsd 4.2
    freebsd freebsd 4.3
    freebsd freebsd 4.4
    freebsd freebsd 4.5
    freebsd freebsd 4.6
    freebsd freebsd 4.7
    freebsd freebsd 4.8
    freebsd freebsd 5.1
    freebsd freebsd 5.2
    freebsd freebsd 4.9
    freebsd freebsd 4.10
    freebsd freebsd 4.6.2