Vulnerability Description
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.4.0 |
| Redhat | Enterprise Linux | 2.1 |
| Redhat | Enterprise Linux Desktop | 3.0 |
| Redhat | Fedora Core | core_2.0 |
| Redhat | Linux Advanced Workstation | 2.1 |
| Suse | Suse Linux | 1.0 |
| Trustix | Secure Linux | 1.5 |
| Turbolinux | Turbolinux Server | 10.0 |
References
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://secunia.com/advisories/20338
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1082
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.redhat.com/support/errata/RHSA-2004-537.htmlPatchVendor Advisory
FAQ
What is CVE-2004-1072?
CVE-2004-1072 is a vulnerability with a CVSS score of 7.2 (HIGH). The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than...
How severe is CVE-2004-1072?
CVE-2004-1072 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1072?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Fedora Core, Redhat Linux Advanced Workstation.