CVE-2004-0136
HexView Security Advisory 2004-06-01.01
Severity Score
5.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."
La llamada a la función mapelf32exec en IRIX 6.5.20 6.5.24 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante un "binario corrupto".
Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-02-11 CVE Reserved
- 2004-06-18 CVE Published
- 2024-08-08 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/11872 | Third Party Advisory | |
http://www.osvdb.org/7123 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16416 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc | 2017-07-11 | |
http://www.securityfocus.com/bid/10547 | 2017-07-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.20f Search vendor "Sgi" for product "Irix" and version "6.5.20f" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.20m Search vendor "Sgi" for product "Irix" and version "6.5.20m" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.21f Search vendor "Sgi" for product "Irix" and version "6.5.21f" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.21m Search vendor "Sgi" for product "Irix" and version "6.5.21m" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.22 Search vendor "Sgi" for product "Irix" and version "6.5.22" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.23 Search vendor "Sgi" for product "Irix" and version "6.5.23" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.24 Search vendor "Sgi" for product "Irix" and version "6.5.24" | - |
Affected
| ||||||
Sgi Search vendor "Sgi" | Irix Search vendor "Sgi" for product "Irix" | 6.5.25 Search vendor "Sgi" for product "Irix" and version "6.5.25" | - |
Affected
|