CVE-2004-0109
iDEFENSE Security Advisory 2004-04-14.t
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Desbordamiento de búfer en el componente de sistema de ficheros ISO9660 del kernel de Linux 2.4.x y 2.6.x permite a usuarios locales con acceso físico desbordar memoria del kernel y ejecutar código arbitrario mediante un CD malformado con un una entrada de enlace simbólico larga.
iDEFENSE Security Advisory 04.14.04: The Linux kernel performs no length checking on symbolic links stored on an ISO9660 file system, allowing a malformed CD to perform an arbitrary length overflow in kernel memory. Symbolic links on ISO9660 file systems are supported by the 'Rock Ridge' extension to the standard format. The vulnerability can be triggered by performing a directory listing on a maliciously constructed ISO file system, or attempting to access a file via a malformed symlink on such a file system. Many distributions allow local users to mount CDs, which makes them potentially vulnerable to local elevation attacks. The issue affects the 2.4.x, 2.5.x and 2.6.x kernel. Other kernel implementations may also be vulnerable.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2004-02-02 CVE Reserved
- 2004-04-14 CVE Published
- 2024-08-08 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (44)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc | 2017-10-11 | |
http://rhn.redhat.com/errata/RHSA-2004-166.html | 2017-10-11 | |
http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html | 2017-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.4.0 Search vendor "Linux" for product "Linux Kernel" and version "2.4.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.5.0 Search vendor "Linux" for product "Linux Kernel" and version "2.5.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.0 Search vendor "Linux" for product "Linux Kernel" and version "2.6.0" | - |
Affected
|