First published: Fri Jul 25 2003(Updated: )
The RPC code in Linux kernel 2.4 sets the reuse flag when sockets are created, which could allow local users to bind to UDP ports that are used by privileged services such as nfsd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =7.2 | |
Red Hat Linux | =8.0 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =9.0 | |
Red Hat Linux | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0464 is considered a moderate severity vulnerability that can allow local users to bind to UDP ports of privileged services.
To fix CVE-2003-0464, you should upgrade to a patched version of the Linux kernel provided by your distribution.
CVE-2003-0464 affects local users on Red Hat Linux versions 7.1, 7.2, 7.3, 8.0, and 9.0.
CVE-2003-0464 is associated with local privilege escalation attacks, allowing users to hijack services.
No, CVE-2003-0464 specifically requires local access to the affected system to exploit.