First published: Wed Feb 19 2003(Updated: )
uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0019 has been classified as a moderate severity vulnerability due to its potential to allow local users to manipulate network interfaces.
To fix CVE-2003-0019, remove the setuid bit from the uml_net binary or upgrade to a secure version of the kernel-utils package.
CVE-2003-0019 affects local users of Red Hat Linux 8.0 who can exploit the incorrect setuid root privileges of the uml_net binary.
Attackers can modify network interfaces, including changing ARP entries and enabling promiscuous mode, which could lead to network data interception.
CVE-2003-0019 was disclosed in 2003, highlighting a vulnerability in the kernel-utils package for Red Hat Linux 8.0.