summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2004-1072
blob: 822e3a634697038f6a431417244904db3fca7f6d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Candidate: CVE-2004-1072
References: 
 MISC:http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
 FEDORA:FLSA:2336
 URL:https://bugzilla.fedora.us/show_bug.cgi?id=2336
 MANDRAKE:MDKSA-2005:022
 URL:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022
 REDHAT:RHSA-2004:537
 URL:http://www.redhat.com/support/errata/RHSA-2004-537.html
 REDHAT:RHSA-2005:275
 URL:http://www.redhat.com/support/errata/RHSA-2005-275.html
 XF:linux-elf-setuid-gain-privileges(18025)
 URL:http://xforce.iss.net/xforce/xfdb/18025
Description: 
 The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and
 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL
 terminated, which could cause strings longer than PATH_MAX to be used, leading
 to buffer overflows that allow local users to cause a denial of service (hang)
 and possibly execute arbitrary code.
Notes: 
Bugs: 
upstream: 
linux-2.6: 
2.6.8-sarge-security: released (2.6.8-9) [elf-loader-fixes.dpatch, elf-loader-fixes-the-return.dpatch]
2.4.27-sarge-security: released (2.4.27-6) [097-elf_loader_overflow-1.diff, 097-elf_loader_overflow-2.diff, 097-elf_loader_overflow-3.diff, 097-elf_loader_overflow-4.diff]
2.4.19-woody-security: released (2.4.19-4.woody3)
2.4.18-woody-security: released (2.4.18-14.4)
2.4.17-woody-security: released (2.4.17-1woody4)
2.4.16-woody-security: released (2.4.16-1woody3)
2.4.17-woody-security-hppa: released (32.5)
2.4.17-woody-security-ia64: released (011226.18)
2.4.18-woody-security-hppa: released (62.4)

© 2014-2024 Faster IT GmbH | imprint | privacy policy