Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc - Patch, Vendor Advisory | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc - | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 - | |
References | () http://marc.info/?l=bugtraq&m=108213675028441&w=2 - | |
References | () http://rhn.redhat.com/errata/RHSA-2004-166.html - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/11361 - | |
References | () http://secunia.com/advisories/11362 - | |
References | () http://secunia.com/advisories/11373 - | |
References | () http://secunia.com/advisories/11429 - | |
References | () http://secunia.com/advisories/11464 - | |
References | () http://secunia.com/advisories/11469 - | |
References | () http://secunia.com/advisories/11470 - | |
References | () http://secunia.com/advisories/11486 - | |
References | () http://secunia.com/advisories/11494 - | |
References | () http://secunia.com/advisories/11518 - | |
References | () http://secunia.com/advisories/11626 - | |
References | () http://secunia.com/advisories/11861 - | |
References | () http://secunia.com/advisories/11891 - | |
References | () http://secunia.com/advisories/11986 - | |
References | () http://secunia.com/advisories/12003 - | |
References | () http://security.gentoo.org/glsa/glsa-200407-02.xml - | |
References | () http://www.ciac.org/ciac/bulletins/o-121.shtml - | |
References | () http://www.ciac.org/ciac/bulletins/o-127.shtml - | |
References | () http://www.debian.org/security/2004/dsa-479 - | |
References | () http://www.debian.org/security/2004/dsa-480 - | |
References | () http://www.debian.org/security/2004/dsa-481 - | |
References | () http://www.debian.org/security/2004/dsa-482 - | |
References | () http://www.debian.org/security/2004/dsa-489 - | |
References | () http://www.debian.org/security/2004/dsa-491 - | |
References | () http://www.debian.org/security/2004/dsa-495 - | |
References | () http://www.idefense.com/application/poi/display?id=101&type=vulnerabilities - Vendor Advisory | |
References | () http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:029 - | |
References | () http://www.novell.com/linux/security/advisories/2004_09_kernel.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-105.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-106.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-183.html - | |
References | () http://www.securityfocus.com/bid/10141 - | |
References | () http://www.turbolinux.com/security/2004/TLSA-2004-14.txt - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15866 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940 - |
Information
Published : 2004-06-01 04:00
Updated : 2024-11-20 23:47
NVD link : CVE-2004-0109
Mitre link : CVE-2004-0109
CVE.ORG link : CVE-2004-0109
JSON object : View
Products Affected
linux
- linux_kernel
CWE