CVE-2003-0984

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.

References

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000799

http://marc.info/?l=bugtraq&m=107394143105081&w=2

http://secunia.com/advisories/10533

http://secunia.com/advisories/10536

http://secunia.com/advisories/10537

http://secunia.com/advisories/10538

http://secunia.com/advisories/10555

http://secunia.com/advisories/10582

http://secunia.com/advisories/10583

http://secunia.com/advisories/20162

http://secunia.com/advisories/20163

http://secunia.com/advisories/20202

http://secunia.com/advisories/20338

http://www.debian.org/security/2006/dsa-1067

http://www.debian.org/security/2006/dsa-1069

http://www.debian.org/security/2006/dsa-1070

http://www.debian.org/security/2006/dsa-1082

http://www.linuxsecurity.com/advisories/engarde_advisory-3904.html

http://www.mandriva.com/security/advisories?name=MDKSA-2004:001

http://www.novell.com/linux/security/advisories/2003_049_kernel.html

http://www.osvdb.org/3317

http://www.redhat.com/archives/fedora-announce-list/2004-January/msg00000.html

http://www.redhat.com/support/errata/RHSA-2003-417.html

http://www.redhat.com/support/errata/RHSA-2004-188.html

http://www.securityfocus.com/bid/9154

http://www.securitytracker.com/id?1008594

https://exchange.xforce.ibmcloud.com/vulnerabilities/13943

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1013

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A859

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9406

Details

Source: MITRE

Published: 2004-01-05

Updated: 2017-10-11

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*

Tenable Plugins

View all (10 total)

IDNameProductFamilySeverity
22624Debian DSA-1082-1 : kernel-source-2.4.17 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22612Debian DSA-1070-1 : kernel-source-2.4.19 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22611Debian DSA-1069-1 : kernel-source-2.4.18 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22609Debian DSA-1067-1 : kernel-source-2.4.16 - several vulnerabilitiesNessusDebian Local Security Checks
critical
14101Mandrake Linux Security Advisory : kernel (MDKSA-2004:001)NessusMandriva Local Security Checks
high
13670Fedora Core 1 : kernel-2.4.22-1.2140.nptl (2003-047)NessusFedora Local Security Checks
medium
13669Fedora Core 1 : kernel-2.4.22-1.2138.nptl (2003-046)NessusFedora Local Security Checks
high
12494RHEL 3 : kernel (RHSA-2004:188)NessusRed Hat Local Security Checks
high
801593Red Hat 2004-188 Security CheckLog Correlation EngineGeneric
high
801545Fedora 2003-047 Security CheckLog Correlation EngineGeneric
high