Vulnerability Description
uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Linux | 8.0 |
References
- http://www.ciac.org/ciac/bulletins/n-044.shtml
- http://www.iss.net/security_center/static/11276.phpPatchVendor Advisory
- http://www.kb.cert.org/vuls/id/134025US Government Resource
- http://www.redhat.com/support/errata/RHSA-2003-056.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/6801
- http://www.ciac.org/ciac/bulletins/n-044.shtml
- http://www.iss.net/security_center/static/11276.phpPatchVendor Advisory
- http://www.kb.cert.org/vuls/id/134025US Government Resource
- http://www.redhat.com/support/errata/RHSA-2003-056.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/6801
FAQ
What is CVE-2003-0019?
CVE-2003-0019 is a vulnerability with a CVSS score of 7.2 (HIGH). uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfac...
How severe is CVE-2003-0019?
CVE-2003-0019 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0019?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Linux.