First published: Fri Apr 30 2004(Updated: )
Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI ProPack | =3.0 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.3 | |
Slackware Linux | =9.1 | |
Linux Kernel | =2.4.23_ow2 | |
Linux Kernel | =2.4.23 | |
Linux Kernel | =2.6.2 | |
Slackware Linux | =current | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.4.25 | |
Linux Kernel | =2.4.24 | |
Linux Kernel | =2.4.23-pre9 | |
Linux Kernel | =2.4.24_ow1 | |
Linux Kernel | =2.4.22 | |
Linux Kernel | =2.6.1-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0424 has a moderate severity rating as it can cause denial of service and potential arbitrary code execution.
To fix CVE-2004-0424, you should update your Linux kernel to a version that is not vulnerable, specifically versions newer than 2.6.3.
CVE-2004-0424 affects local users on systems running Linux kernel versions from 2.4.22 to 2.6.3, along with specific distributions like Slackware.
CVE-2004-0424 is associated with integer overflow issues in the ip_setsockopt function that can lead to system crashes.
The MCAST_MSFILTER socket option is exploited in CVE-2004-0424, allowing local users to trigger the integer overflow.