First published: Fri Feb 06 2004(Updated: )
Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux-vserver | =1.24 | |
Linux-vserver | =1.21 | |
Linux-vserver | =1.22 | |
Linux-vserver | =1.20 | |
Linux-vserver | =1.23 | |
Linux-vserver | =1.20 | |
Linux-vserver | =1.21 | |
Linux-vserver | =1.22 | |
Linux-vserver | =1.23 | |
Linux-vserver | =1.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2073 has a high severity rating due to the potential for local users with root privileges to access the filesystem outside their designated virtual server.
To mitigate CVE-2004-2073, it is recommended to upgrade to a version of Linux-VServer that is not affected by this vulnerability.
CVE-2004-2073 affects Linux-VServer versions 1.20 through 1.24.
CVE-2004-2073 can be exploited by local users who already have root privileges on a virtual server.
The impact of CVE-2004-2073 allows unauthorized access to the filesystem, potentially leading to data breaches or system compromises.