// For flags

CVE-2004-0424

Linux Kernel 2.6.3 - 'setsockopt' Local Denial of Service

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.

Desbordamiento de enteros en la función ip_setsockopt en el kernel de Linux 2.4.22 a 2.4.25 y 2.6.1 a 2.6.3 permite a usuarios locales causar una denegación de servicio (caída) o ejecutar código arbitrario mediante la opción de socket MCAST_MSFILTER.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2004-04-21 CVE Reserved
  • 2004-04-21 First Exploit
  • 2004-04-30 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sgi
Search vendor "Sgi"
Propack
Search vendor "Sgi" for product "Propack"
3.0
Search vendor "Sgi" for product "Propack" and version "3.0"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.22
Search vendor "Linux" for product "Linux Kernel" and version "2.4.22"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.23
Search vendor "Linux" for product "Linux Kernel" and version "2.4.23"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.23
Search vendor "Linux" for product "Linux Kernel" and version "2.4.23"
pre9
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.23_ow2
Search vendor "Linux" for product "Linux Kernel" and version "2.4.23_ow2"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.24
Search vendor "Linux" for product "Linux Kernel" and version "2.4.24"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.24_ow1
Search vendor "Linux" for product "Linux Kernel" and version "2.4.24_ow1"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.4.25
Search vendor "Linux" for product "Linux Kernel" and version "2.4.25"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.1
Search vendor "Linux" for product "Linux Kernel" and version "2.6.1"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.1
Search vendor "Linux" for product "Linux Kernel" and version "2.6.1"
rc1
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.1
Search vendor "Linux" for product "Linux Kernel" and version "2.6.1"
rc2
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.2
Search vendor "Linux" for product "Linux Kernel" and version "2.6.2"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.3
Search vendor "Linux" for product "Linux Kernel" and version "2.6.3"
-
Affected
Slackware
Search vendor "Slackware"
Slackware Linux
Search vendor "Slackware" for product "Slackware Linux"
9.1
Search vendor "Slackware" for product "Slackware Linux" and version "9.1"
-
Affected
Slackware
Search vendor "Slackware"
Slackware Linux
Search vendor "Slackware" for product "Slackware Linux"
current
Search vendor "Slackware" for product "Slackware Linux" and version "current"
-
Affected