First published: Wed Dec 15 2004(Updated: )
SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to conduct unauthorized write activities to modify the firmware of associated SCSI devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =8.1 | |
SUSE Linux | =8.1 | |
SUSE Linux | =8.2 | |
SUSE Linux | =8.2 | |
SUSE Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1190 is considered to have a moderate severity level due to the potential for unauthorized write access to important SCSI device firmware.
To fix CVE-2004-1190, you should upgrade to a newer version of SUSE Linux that has addressed this vulnerability.
CVE-2004-1190 affects SUSE Linux versions 8.1, 8.2, and 9.0, including the Enterprise Server editions of these releases.
CVE-2004-1190 allows local users to perform unauthorized write operations on SCSI devices by exploiting improper command checks.
CVE-2004-1190 is a local vulnerability, meaning that an attacker must have local access to the system to exploit it.