Vulnerability Name: CVE-2004-0997 (CCN-40342) Assigned: 2004-12-31 Published: 2004-12-31 Updated: 2008-09-05 Summary: Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors. This vulnerability is addressed in the following product release:
Linux, Linux kernel, 2.4.17 CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )3.4 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Privileges References: Source: CCN Type: BugTraq Mailing List, Sat May 20 2006 - 03:20:15 CDTNew Linux kernel 2.4.16 packages fix several vulnerabilities Source: MITRE Type: CNACVE-2004-0997 Source: CONFIRM Type: Patchhttp://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes Source: SECUNIA Type: Patch, Vendor Advisory20162 Source: SECUNIA Type: Patch, Vendor Advisory20163 Source: SECUNIA Type: Patch, Vendor Advisory20202 Source: SECUNIA Type: UNKNOWN20338 Source: MISC Type: UNKNOWNhttp://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&rev=0&sc=0 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-1067 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-1069 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-1070 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-1082 Source: CCN Type: The Linux Kernel Archives Web siteThe Linux Kernel Archives Source: CCN Type: OSVDB ID: 44993Linux Kernel ptrace MIPS Assembly Code Unspecified Local Privilege Escalation Source: BID Type: UNKNOWN18176 Source: CCN Type: BID-18176Linux Kernel MIPS Ptrace Local Privilege Escalation Vulnerability Source: XF Type: UNKNOWNlinux-kernel-ptrace-privilege-escalation(40342) Vulnerable Configuration: Configuration 1 :cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:* OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
linux linux kernel 2.4.0
linux linux kernel 2.4.0 test1
linux linux kernel 2.4.0 test10
linux linux kernel 2.4.0 test11
linux linux kernel 2.4.0 test12
linux linux kernel 2.4.0 test2
linux linux kernel 2.4.0 test3
linux linux kernel 2.4.0 test4
linux linux kernel 2.4.0 test5
linux linux kernel 2.4.0 test6
linux linux kernel 2.4.0 test7
linux linux kernel 2.4.0 test8
linux linux kernel 2.4.0 test9
linux linux kernel 2.4.1
linux linux kernel 2.4.2
linux linux kernel 2.4.3
linux linux kernel 2.4.4
linux linux kernel 2.4.5
linux linux kernel 2.4.6
linux linux kernel 2.4.7
linux linux kernel 2.4.8
linux linux kernel 2.4.9
linux linux kernel 2.4.10
linux linux kernel 2.4.11
linux linux kernel 2.4.12
linux linux kernel 2.4.13
linux linux kernel 2.4.14
linux linux kernel 2.4.15
linux linux kernel 2.4.16
linux linux kernel 2.4.3
linux linux kernel 2.4.4
linux linux kernel 2.4.5
linux linux kernel 2.4.6
linux linux kernel 2.4.7
linux linux kernel 2.4.0
linux linux kernel 2.4.0 test1
linux linux kernel 2.4.0 test10
linux linux kernel 2.4.0 test11
linux linux kernel 2.4.0 test12
linux linux kernel 2.4.0 test2
linux linux kernel 2.4.0 test3
linux linux kernel 2.4.0 test4
linux linux kernel 2.4.0 test5
linux linux kernel 2.4.0 test6
linux linux kernel 2.4.0 test7
linux linux kernel 2.4.0 test8
linux linux kernel 2.4.0 test9
linux linux kernel 2.4.1
linux linux kernel 2.4.10
linux linux kernel 2.4.11
linux linux kernel 2.4.12
linux linux kernel 2.4.13
linux linux kernel 2.4.14
linux linux kernel 2.4.15
linux linux kernel 2.4.16
linux linux kernel 2.4.2
linux linux kernel 2.4.8
linux linux kernel 2.4.9
debian debian linux 3.0