CVE-2004-0001
CVSS7.2
发布时间 :2004-02-17 00:00:00
修订时间 :2008-09-05 16:37:16
NMCOS    

[原文]Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.


[CNNVD]Linux Kernel 32位Ptrace模拟全部内核权利漏洞(CNNVD-200402-053)

        
        Suse Linux是一款开放源代码操作系统。
        Linux中的ptrace()32位模拟允许从用户空间修改CPU寄存器,本地攻击者可以利用这个漏洞获得系统的全部访问权限。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:868Linux Kernel eflags Checking Privilege Escalation Vulnerability
oval:org.mitre.oval:def:10910Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0001
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0001
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200402-053
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/337238
(VENDOR_ADVISORY)  CERT-VN  VU#337238
http://www.redhat.com/support/errata/RHSA-2004-017.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:017
http://xforce.iss.net/xforce/xfdb/14888
(VENDOR_ADVISORY)  XF  linux-ptrace-gain-privilege(14888)
http://www.securityfocus.com/bid/9429
(VENDOR_ADVISORY)  BID  9429
http://security.gentoo.org/glsa/glsa-200402-06.xml
(UNKNOWN)  GENTOO  GLSA-200402-06

- 漏洞信息

Linux Kernel 32位Ptrace模拟全部内核权利漏洞
高危 输入验证
2004-02-17 00:00:00 2005-05-13 00:00:00
本地  
        
        Suse Linux是一款开放源代码操作系统。
        Linux中的ptrace()32位模拟允许从用户空间修改CPU寄存器,本地攻击者可以利用这个漏洞获得系统的全部访问权限。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        S.u.S.E.
        --------
        S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2004:003)以及相应补丁:
        SuSE-SA:2004:003:Linux Kernel
        链接:
        补丁下载:
        AMD64 Platform:
        SuSE-9.0:
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_deflt-2.4.21-178.x86_64.rpm
         4896825f6399bebc80073dbbd74432cd
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/k_deflt-2.4.21-178.src.rpm
         e9afc5cbb5fc1dddb53e179a52d45f0a
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/k_smp-2.4.21-178.x86_64.rpm
         8b7667ac6baf4aebd4961274cbdaa84e
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/k_smp-2.4.21-178.src.rpm
         ffc25e3c1b9a4ed4e5182ff5cbdd5c18
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/kernel-source-2.4.21-178.x86_64.rpm
         9422ec31eb76d26a1dfaca8fb8542907
        source rpm(s):
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/kernel-source-2.4.21-178.src.rpm
         8acc26621600cc7411f964656c435389

- 漏洞信息

6853
Linux Kernel eflags 32-bit ptrace Emulation Privilege Escalation

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-01-16 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel 32 Bit Ptrace Emulation Full Kernel Rights Vulnerability
Input Validation Error 9429
No Yes
2004-01-15 12:00:00 2009-07-12 02:06:00
Discovery of this issue is credited to Andi Kleen <ak@colin2.muc.de>.

- 受影响的程序版本

Red Hat Fedora Core1
Linux kernel 2.4.21
+ Conectiva Linux 9.0
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ SuSE SUSE Linux Enterprise Server 8

- 漏洞讨论

A vulnerability has been discovered in the 32-bit ptrace emulation in the Linux kernel on x86_64 architectures. This vulnerability allows a user space program to gain full control of the kernel due to a failure to validate information stored in a system register.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Mandrake has released an advisory (MDKSA-2004:015) with fixes to address this issue. Please see the referenced advisory for more information.

SuSE has released advisory SuSE-SA:2004:003 as well as updates dealing with this issue.

Red Hat has released an advisory FEDORA-2004-063 for Fedora Core 1. Please see the referenced advisory for more information.

Gentoo has released an advisory GLSA-200402-06 to address this issue. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to obtain fixes:

emerge sync
emerge -pv your-favorite-sources
emerge your-favorite-sources

Follow usual procedures for compiling and installing a kernel.
If you use genkernel, run genkernel as you would do normally.

Mandrake has released an updated advisory MDKSA-2004:015-1 to address this and other issues. Please see the referenced advisory for more information.


Red Hat Fedora Core1

Linux kernel 2.4.21

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站