Vulnerability Description
Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vserver | Linux-Vserver | 1.20 |
References
- http://secunia.com/advisories/10816
- http://www.linux-vserver.org/index.php?page=ChangeLogPatchVendor Advisory
- http://www.osvdb.org/3875
- http://www.securityfocus.com/archive/1/353003ExploitVendor Advisory
- http://www.securityfocus.com/bid/9596Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15073
- http://secunia.com/advisories/10816
- http://www.linux-vserver.org/index.php?page=ChangeLogPatchVendor Advisory
- http://www.osvdb.org/3875
- http://www.securityfocus.com/archive/1/353003ExploitVendor Advisory
- http://www.securityfocus.com/bid/9596Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15073
FAQ
What is CVE-2004-2073?
CVE-2004-2073 is a vulnerability with a CVSS score of 7.2 (HIGH). Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command.
How severe is CVE-2004-2073?
CVE-2004-2073 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2073?
Check the references section above for vendor advisories and patch information. Affected products include: Vserver Linux-Vserver.