First published: Wed Jun 23 2004(Updated: )
The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.23 | |
SGI IRIX | =6.5.21f | |
SGI IRIX | =6.5.21m | |
SGI IRIX | =6.5.20m | |
SGI IRIX | =6.5.20f | |
SGI IRIX | =6.5.24 | |
SGI IRIX | =6.5.22 | |
SGI IRIX | =6.5.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0136 has been categorized as a high severity vulnerability because it allows local users to cause a denial of service.
To mitigate CVE-2004-0136, users should update their SGI IRIX systems to a version later than 6.5.24.
CVE-2004-0136 affects IRIX versions 6.5.20 through 6.5.24.
No, CVE-2004-0136 requires local access to the affected system for exploitation.
CVE-2004-0136 can lead to a denial of service, causing the system to crash, which significantly impacts performance.