Vulnerability Description
Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Netbsd | 1.5 |
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-010.txt.asc
- http://gleg.net/advisory_netbsd2.shtmlPatchVendor Advisory
- http://secunia.com/advisories/13501/PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18564
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-010.txt.asc
- http://gleg.net/advisory_netbsd2.shtmlPatchVendor Advisory
- http://secunia.com/advisories/13501/PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18564
FAQ
What is CVE-2004-1323?
CVE-2004-1323 is a vulnerability with a CVSS score of 2.1 (LOW). Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and ...
How severe is CVE-2004-1323?
CVE-2004-1323 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1323?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Netbsd.