Vulnerability Description
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Bigmem Kernel | 2.4.20-8 |
| Redhat | Kernel | 2.4.20-8 |
| Redhat | Kernel Doc | 2.4.20-8 |
| Redhat | Kernel Source | 2.4.20-8 |
| Linux | Linux Kernel | 2.2.0 |
| Netwosix | Netwosix Linux | 1.0 |
| Trustix | Secure Linux | 1.5 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0040.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000820
- http://fedoranews.org/updates/FEDORA-2004-079.shtml
- http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:015
- http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
- http://marc.info/?l=bugtraq&m=107711762014175&w=2
- http://marc.info/?l=bugtraq&m=107712137732553&w=2
- http://marc.info/?l=bugtraq&m=107755871932680&w=2
- http://security.gentoo.org/glsa/glsa-200403-02.xmlPatchVendor Advisory
- http://www.ciac.org/ciac/bulletins/o-082.shtml
- http://www.debian.org/security/2004/dsa-438
- http://www.debian.org/security/2004/dsa-439PatchVendor Advisory
- http://www.debian.org/security/2004/dsa-440
- http://www.debian.org/security/2004/dsa-441
- http://www.debian.org/security/2004/dsa-442
FAQ
What is CVE-2004-0077?
CVE-2004-0077 is a vulnerability with a CVSS score of 7.2 (HIGH). The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number ...
How severe is CVE-2004-0077?
CVE-2004-0077 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0077?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Bigmem Kernel, Redhat Kernel, Redhat Kernel Doc, Redhat Kernel Source, Linux Linux Kernel.