CVE-2004-0565
 
Severity Score
2.1
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Fuga de información de punto flotante en el código de cambio de contexto de Linux 2.4.x sólo comprueba el bit MFH pero no verifica el propietario de FPH, lo que permite a usuarios locales leer valores de registros de otros procesos estableciendo el bit MFH.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-06-15 CVE Reserved
- 2004-07-08 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/20162 | Third Party Advisory | |
http://secunia.com/advisories/20163 | Third Party Advisory | |
http://secunia.com/advisories/20202 | Third Party Advisory | |
http://secunia.com/advisories/20338 | Third Party Advisory | |
http://www.securityfocus.com/bid/10687 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16644 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html | 2017-10-11 | |
http://www.debian.org/security/2006/dsa-1067 | 2017-10-11 | |
http://www.debian.org/security/2006/dsa-1069 | 2017-10-11 | |
http://www.debian.org/security/2006/dsa-1070 | 2017-10-11 | |
http://www.debian.org/security/2006/dsa-1082 | 2017-10-11 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:066 | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2004-504.html | 2017-10-11 | |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734 | 2017-10-11 | |
https://access.redhat.com/security/cve/CVE-2004-0565 | 2004-12-23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617231 | 2004-12-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Multi Network Firewall Search vendor "Mandrakesoft" for product "Mandrake Multi Network Firewall" | 8.2 Search vendor "Mandrakesoft" for product "Mandrake Multi Network Firewall" and version "8.2" | - |
Affected
| ||||||
Gentoo Search vendor "Gentoo" | Linux Search vendor "Gentoo" for product "Linux" | * | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.4.0 Search vendor "Linux" for product "Linux Kernel" and version "2.4.0" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 9.1 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "9.1" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 9.2 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "9.2" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 10.0 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "10.0" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Corporate Server Search vendor "Mandrakesoft" for product "Mandrake Linux Corporate Server" | 2.1 Search vendor "Mandrakesoft" for product "Mandrake Linux Corporate Server" and version "2.1" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2 Search vendor "Trustix" for product "Secure Linux" and version "2" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2.0 Search vendor "Trustix" for product "Secure Linux" and version "2.0" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2.1 Search vendor "Trustix" for product "Secure Linux" and version "2.1" | - |
Affected
|