First published: Wed Dec 01 2004(Updated: )
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =9.0 | |
Linux Kernel | =2.4.18-pre1 | |
Linux Kernel | =2.4.15 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Fedora Core | =core_2.0 | |
Linux Kernel | =2.4.0-test1 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.4.11 | |
Linux Kernel | =2.6.1 | |
Trustix Secure Linux | =2.0 | |
SUSE Linux | =9.2 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
SUSE Linux | =9.0 | |
Linux Kernel | =2.4.27-pre3 | |
Linux Kernel | =2.4.18-pre3 | |
Linux Kernel | =2.4.18-pre5 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Linux Kernel | =2.4.26 | |
Linux Kernel | =2.4.0-test6 | |
SUSE Linux | =8.2 | |
Linux Kernel | =2.4.19-pre1 | |
Red Hat Enterprise Linux | =3.0 | |
Linux Kernel | =2.4.21-pre7 | |
Linux Kernel | =2.4.27-pre2 | |
Red Hat Enterprise Linux | =2.1 | |
Linux Kernel | =2.4.12 | |
Linux Kernel | =2.4.13 | |
Linux Kernel | =2.6.0-test5 | |
SUSE Linux | =8 | |
Linux Kernel | =2.4.19-pre4 | |
Linux Kernel | =2.6.3 | |
SUSE Linux | =1.0 | |
Linux Kernel | =2.6.0-test2 | |
Linux Kernel | =2.4.17 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6_test9_cvs | |
Linux Kernel | =2.4.21-pre1 | |
Red Hat Enterprise Linux | =2.1 | |
Linux Kernel | =2.6.7-rc1 | |
Linux Kernel | =2.4.21 | |
Linux Kernel | =2.4.23_ow2 | |
SUSE Linux | =9.0 | |
Linux Kernel | =2.4.23 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.8-rc1 | |
Linux Kernel | =2.6.0-test11 | |
Linux Kernel | =2.4.0-test3 | |
Linux Kernel | =2.4.7 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.4.25 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.4.0-test8 | |
Linux Kernel | =2.4.24 | |
Linux Kernel | =2.4.9 | |
Linux Kernel | =2.6.0-test1 | |
Trustix Secure Linux | =1.5 | |
Linux Kernel | =2.6.0-test6 | |
Linux Kernel | =2.4.23-pre9 | |
Linux Kernel | =2.4.0-test7 | |
Linux Kernel | =2.6.0-test4 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.4.24_ow1 | |
Linux Kernel | =2.4.18-pre4 | |
Linux Kernel | =2.4.19-pre6 | |
Linux Kernel | =2.4.10 | |
Linux Kernel | =2.4.0 | |
Linux Kernel | =2.4.2 | |
Linux Kernel | =2.4.19-pre2 | |
Linux Kernel | =2.4.0-test12 | |
Linux Kernel | =2.4.18-pre6 | |
Linux Kernel | =2.4.16 | |
Linux Kernel | =2.4.8 | |
Linux Kernel | =2.4.19-pre3 | |
Linux Kernel | =2.4.19 | |
Linux Kernel | =2.4.27-pre5 | |
Linux Kernel | =2.4.14 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Linux Kernel | =2.6.0-test10 | |
Linux Kernel | =2.4.27-pre1 | |
SUSE Linux | =9.1 | |
Linux Kernel | =2.4.0-test2 | |
Linux Kernel | =2.4.18 | |
Linux Kernel | =2.6.0-test9 | |
Linux Kernel | =2.4.19-pre5 | |
Red Hat Enterprise Linux | =3.0 | |
Linux Kernel | =2.4.21-pre4 | |
Linux Kernel | =2.4.22 | |
Linux Kernel | =2.4.0-test5 | |
Linux Kernel | =2.4.5 | |
Red Hat Enterprise Linux | =2.1 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.4.18 | |
Linux Kernel | =2.6.6-rc1 | |
Linux Kernel | =2.4.27-pre4 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.4.3 | |
Red Hat Enterprise Linux | =2.1 | |
Linux Kernel | =2.4.1 | |
Trustix Secure Linux | =2.1 | |
Linux Kernel | =2.4.4 | |
Linux Kernel | =2.4.18-pre2 | |
Linux Kernel | =2.4.18-pre8 | |
Linux Kernel | =2.6.0-test7 | |
Trustix Secure Linux | =2.2 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.0-test11 | |
Red Hat Fedora Core | =core_3.0 | |
Linux Kernel | =2.4.6 | |
Linux Kernel | =2.4.0-test4 | |
Linux Kernel | =2.6.8-rc2 | |
Linux Kernel | =2.6.8-rc3 | |
Linux Kernel | =2.4.0-test10 | |
Turbolinux Server | =10.0 | |
Linux Kernel | =2.4.20 | |
Linux Kernel | =2.4.0-test9 | |
Linux Kernel | =2.6.0-test8 | |
Linux Kernel | =2.4.18-pre7 | |
SUSE Linux | =8.1 | |
Red Hat Enterprise Linux | =2.1 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.0-test3 | |
Red Hat Enterprise Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1073 is considered a moderate severity vulnerability due to its ability to allow local users to read non-readable ELF binaries.
To mitigate CVE-2004-1073, you should upgrade the Linux kernel to a version higher than 2.4.27 or 2.6.8.
CVE-2004-1073 affects local users on systems running the Linux kernel versions 2.4.x up to 2.4.27 and 2.6.x up to 2.6.8.
Systems running affected versions of the Linux kernel, including various distributions like Red Hat, SUSE, and Trustix Secure Linux, are at risk from CVE-2004-1073.
CVE-2004-1073 does not directly lead to privilege escalation but allows unauthorized reading of sensitive ELF binaries, which can compromise system integrity.