CVE-2004-2731 : Detail

CVE-2004-2731

0.12%V4
Local
2007-10-09
08h00 +00:00
2008-02-26
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.4 AV:L/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.0

Linux>>Linux_kernel >> Version 2.4.1

Linux>>Linux_kernel >> Version 2.4.2

Linux>>Linux_kernel >> Version 2.4.3

Linux>>Linux_kernel >> Version 2.4.3

Linux>>Linux_kernel >> Version 2.4.4

Linux>>Linux_kernel >> Version 2.4.5

Linux>>Linux_kernel >> Version 2.4.6

Linux>>Linux_kernel >> Version 2.4.7

Linux>>Linux_kernel >> Version 2.4.8

Linux>>Linux_kernel >> Version 2.4.9

Linux>>Linux_kernel >> Version 2.4.9_pre5

    Linux>>Linux_kernel >> Version 2.4.10

    Linux>>Linux_kernel >> Version 2.4.11

    Linux>>Linux_kernel >> Version 2.4.11

    Linux>>Linux_kernel >> Version 2.4.12

    Linux>>Linux_kernel >> Version 2.4.13

    Linux>>Linux_kernel >> Version 2.4.14

    Linux>>Linux_kernel >> Version 2.4.15

    Linux>>Linux_kernel >> Version 2.4.16

    Linux>>Linux_kernel >> Version 2.4.17

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.18

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.19

    Linux>>Linux_kernel >> Version 2.4.20

    Linux>>Linux_kernel >> Version 2.4.21

    Linux>>Linux_kernel >> Version 2.4.21

    Linux>>Linux_kernel >> Version 2.4.21

    Linux>>Linux_kernel >> Version 2.4.21

    Linux>>Linux_kernel >> Version 2.4.22

    Linux>>Linux_kernel >> Version 2.4.22

    Linux>>Linux_kernel >> Version 2.4.23

    Linux>>Linux_kernel >> Version 2.4.23

    Linux>>Linux_kernel >> Version 2.4.23_ow2

      Linux>>Linux_kernel >> Version 2.4.24

      Linux>>Linux_kernel >> Version 2.4.24_ow1

        Linux>>Linux_kernel >> Version 2.4.25

        Linux>>Linux_kernel >> Version 2.4.26

        Linux>>Linux_kernel >> Version 2.4.27

        Linux>>Linux_kernel >> Version 2.4.27

        Linux>>Linux_kernel >> Version 2.4.27

        Linux>>Linux_kernel >> Version 2.4.27

        Linux>>Linux_kernel >> Version 2.4.27

        Linux>>Linux_kernel >> Version 2.4.27

        Linux>>Linux_kernel >> Version 2.4.28

        Linux>>Linux_kernel >> Version 2.4.29

        Linux>>Linux_kernel >> Version 2.4.29

        Linux>>Linux_kernel >> Version 2.4.29

        Linux>>Linux_kernel >> Version 2.4.30

        Linux>>Linux_kernel >> Version 2.4.30

        Linux>>Linux_kernel >> Version 2.4.30

        Linux>>Linux_kernel >> Version 2.4.31

        Linux>>Linux_kernel >> Version 2.4.31

        Linux>>Linux_kernel >> Version 2.4.32

        Linux>>Linux_kernel >> Version 2.4.32

        Linux>>Linux_kernel >> Version 2.4.32

        Linux>>Linux_kernel >> Version 2.4.33

        Linux>>Linux_kernel >> Version 2.4.33

        Linux>>Linux_kernel >> Version 2.4.33.2

        Linux>>Linux_kernel >> Version 2.4.33.3

        Linux>>Linux_kernel >> Version 2.4.33.4

        Linux>>Linux_kernel >> Version 2.4.33.5

        Linux>>Linux_kernel >> Version 2.4.34

        Linux>>Linux_kernel >> Version 2.4.34

        Linux>>Linux_kernel >> Version 2.4.34.1

        Linux>>Linux_kernel >> Version 2.4.34.2

        Linux>>Linux_kernel >> Version 2.4.35

        Linux>>Linux_kernel >> Version 2.4.35.2

        Linux>>Linux_kernel >> Version 2.6.0

        Linux>>Linux_kernel >> Version 2.6.1

        Linux>>Linux_kernel >> Version 2.6.2

        Linux>>Linux_kernel >> Version 2.6.3

        Linux>>Linux_kernel >> Version 2.6.4

        Linux>>Linux_kernel >> Version 2.6.5

        Linux>>Linux_kernel >> Version 2.6.6

        Linux>>Linux_kernel >> Version 2.6.7

        References

        http://secunia.com/advisories/11981
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.osvdb.org/7345
        Tags : vdb-entry, x_refsource_OSVDB
        http://securitytracker.com/id?1010617
        Tags : vdb-entry, x_refsource_SECTRACK
        http://www.osvdb.org/8363
        Tags : vdb-entry, x_refsource_OSVDB
        http://www.debian.org/security/2008/dsa-1503
        Tags : vendor-advisory, x_refsource_DEBIAN
        http://secunia.com/advisories/29058
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.securityfocus.com/bid/10632
        Tags : vdb-entry, x_refsource_BID