CVE-2004-1234

load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965 Exploit
http://linux.bkbits.net:8080/linux-2.4/cset%404076466d_SqUm4azg4_v3FIG2-X6XQ
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.redhat.com/support/errata/RHSA-2004-689.html
http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
http://www.securityfocus.com/bid/12101 Patch
https://bugzilla.fedora.us/show_bug.cgi?id=2336 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/18687
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10608
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965 Exploit
http://linux.bkbits.net:8080/linux-2.4/cset%404076466d_SqUm4azg4_v3FIG2-X6XQ
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.redhat.com/support/errata/RHSA-2004-689.html
http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
http://www.securityfocus.com/bid/12101 Patch
https://bugzilla.fedora.us/show_bug.cgi?id=2336 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/18687
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10608
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965 - Exploit () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965 - Exploit
References () http://linux.bkbits.net:8080/linux-2.4/cset%404076466d_SqUm4azg4_v3FIG2-X6XQ - () http://linux.bkbits.net:8080/linux-2.4/cset%404076466d_SqUm4azg4_v3FIG2-X6XQ -
References () http://secunia.com/advisories/20162 - () http://secunia.com/advisories/20162 -
References () http://secunia.com/advisories/20163 - () http://secunia.com/advisories/20163 -
References () http://secunia.com/advisories/20202 - () http://secunia.com/advisories/20202 -
References () http://secunia.com/advisories/20338 - () http://secunia.com/advisories/20338 -
References () http://www.debian.org/security/2006/dsa-1067 - () http://www.debian.org/security/2006/dsa-1067 -
References () http://www.debian.org/security/2006/dsa-1069 - () http://www.debian.org/security/2006/dsa-1069 -
References () http://www.debian.org/security/2006/dsa-1070 - () http://www.debian.org/security/2006/dsa-1070 -
References () http://www.debian.org/security/2006/dsa-1082 - () http://www.debian.org/security/2006/dsa-1082 -
References () http://www.redhat.com/support/errata/RHSA-2004-689.html - () http://www.redhat.com/support/errata/RHSA-2004-689.html -
References () http://www.redhat.com/support/errata/RHSA-2005-016.html - () http://www.redhat.com/support/errata/RHSA-2005-016.html -
References () http://www.redhat.com/support/errata/RHSA-2005-017.html - () http://www.redhat.com/support/errata/RHSA-2005-017.html -
References () http://www.securityfocus.com/bid/12101 - Patch () http://www.securityfocus.com/bid/12101 - Patch
References () https://bugzilla.fedora.us/show_bug.cgi?id=2336 - Patch () https://bugzilla.fedora.us/show_bug.cgi?id=2336 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18687 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18687 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10608 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10608 -

07 Nov 2023, 01:56

Type Values Removed Values Added
References
  • {'url': 'http://linux.bkbits.net:8080/linux-2.4/cset@4076466d_SqUm4azg4_v3FIG2-X6XQ', 'name': 'http://linux.bkbits.net:8080/linux-2.4/cset@4076466d_SqUm4azg4_v3FIG2-X6XQ', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://linux.bkbits.net:8080/linux-2.4/cset%404076466d_SqUm4azg4_v3FIG2-X6XQ -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1234

Mitre link : CVE-2004-1234

CVE.ORG link : CVE-2004-1234


JSON object : View

Products Affected

linux

  • linux_kernel