CVE-2003-0246

The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html
http://marc.info/?l=bugtraq&m=105301461726555&w=2
http://www.debian.org/security/2003/dsa-311 Patch Vendor Advisory
http://www.debian.org/security/2003/dsa-312
http://www.debian.org/security/2003/dsa-332
http://www.debian.org/security/2003/dsa-336
http://www.debian.org/security/2004/dsa-442
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
http://www.redhat.com/support/errata/RHSA-2003-147.html
http://www.redhat.com/support/errata/RHSA-2003-172.html Patch Vendor Advisory
http://www.turbolinux.com/security/TLSA-2003-41.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A278
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html
http://marc.info/?l=bugtraq&m=105301461726555&w=2
http://www.debian.org/security/2003/dsa-311 Patch Vendor Advisory
http://www.debian.org/security/2003/dsa-312
http://www.debian.org/security/2003/dsa-332
http://www.debian.org/security/2003/dsa-336
http://www.debian.org/security/2004/dsa-442
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
http://www.redhat.com/support/errata/RHSA-2003-147.html
http://www.redhat.com/support/errata/RHSA-2003-172.html Patch Vendor Advisory
http://www.turbolinux.com/security/TLSA-2003-41.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A278
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*

History

20 Nov 2024, 23:44

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html - () http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html -
References () http://marc.info/?l=bugtraq&m=105301461726555&w=2 - () http://marc.info/?l=bugtraq&m=105301461726555&w=2 -
References () http://www.debian.org/security/2003/dsa-311 - Patch, Vendor Advisory () http://www.debian.org/security/2003/dsa-311 - Patch, Vendor Advisory
References () http://www.debian.org/security/2003/dsa-312 - () http://www.debian.org/security/2003/dsa-312 -
References () http://www.debian.org/security/2003/dsa-332 - () http://www.debian.org/security/2003/dsa-332 -
References () http://www.debian.org/security/2003/dsa-336 - () http://www.debian.org/security/2003/dsa-336 -
References () http://www.debian.org/security/2004/dsa-442 - () http://www.debian.org/security/2004/dsa-442 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 - () http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 - () http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 -
References () http://www.redhat.com/support/errata/RHSA-2003-147.html - () http://www.redhat.com/support/errata/RHSA-2003-147.html -
References () http://www.redhat.com/support/errata/RHSA-2003-172.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2003-172.html - Patch, Vendor Advisory
References () http://www.turbolinux.com/security/TLSA-2003-41.txt - () http://www.turbolinux.com/security/TLSA-2003-41.txt -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A278 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A278 -

Information

Published : 2003-06-16 04:00

Updated : 2024-11-20 23:44


NVD link : CVE-2003-0246

Mitre link : CVE-2003-0246

CVE.ORG link : CVE-2003-0246


JSON object : View

Products Affected

linux

  • linux_kernel