Vulnerability Name: | CVE-2004-0602 (CCN-16558) |
Assigned: | 2004-07-01 |
Published: | 2004-07-01 |
Updated: | 2017-07-11 |
Summary: | The binary compatibility mode for FreeBSD 4.x and 5.x does not properly handle certain Linux system calls, which could allow local users to access kernel memory to gain privileges or cause a system panic.
|
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Obtain Information |
References: | Source: FREEBSD Type: Patch, Vendor Advisory FreeBSD-SA-04:13
Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-04:13.linux Linux binary compatibility mode input validation error
Source: MITRE Type: CNA CVE-2004-0602
Source: CCN Type: OSVDB ID: 7330 FreeBSD Linux Compatibility Mode Improper System Call Handling Arbitrary Kernel Memory Access
Source: BID Type: Vendor Advisory 10643
Source: CCN Type: BID-10643 FreeBSD Linux Binary Compatibility Memory Access Vulnerability
Source: XF Type: UNKNOWN freebsd-binary-information-disclosure(16558)
Source: XF Type: UNKNOWN freebsd-binary-information-disclosure(16558)
|
Vulnerable Configuration: | Configuration 1: cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:* Configuration CCN 1: cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:5.1:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.9:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.10:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |