PUBLISHED DATE: March 31, 2003CVE-2003-0127: The kernel module loader...
CVSS:
7.2
EPSS:
95.10%
Exploitability:
3.9
In KEV:
No
Description
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Products
Linux Kernel 2.2
Linux Kernel 2.2.10
Linux Kernel 2.2.11
Linux Kernel 2.2.12
Linux Kernel 2.2.13
Linux Kernel 2.2.13
Linux Kernel 2.2.13 pre15
Linux Kernel 2.2.14
Linux Kernel 2.2.15
Linux Kernel 2.2.15
Linux Kernel 2.2.15 pre16
Linux Kernel 2.2.16
Linux Kernel 2.2.16
Linux Kernel 2.2.16 pre5
Linux Kernel 2.2.16 pre6
Linux Kernel 2.2.17
Linux Kernel 2.2.17
Linux Kernel 2.2.17.14
Linux Kernel 2.2.18
Linux Kernel 2.2.19
Linux Kernel 2.2.1
Linux Kernel 2.2.20
Linux Kernel 2.2.21
Linux Kernel 2.2.21
Linux Kernel 2.2.21 pre1
Linux Kernel 2.2.21 pre2
Linux Kernel 2.2.21 pre3
Linux Kernel 2.2.21 pre4
Linux Kernel 2.2.21 rc1
Linux Kernel 2.2.21 rc2
Linux Kernel 2.2.21 rc3
Linux Kernel 2.2.21 rc4
Linux Kernel 2.2.22
Linux Kernel 2.2.22
Linux Kernel 2.2.22 rc1
Linux Kernel 2.2.22 rc2
Linux Kernel 2.2.22 rc3
Linux Kernel 2.2.23
Linux Kernel 2.2.23
Linux Kernel 2.2.23 rc1
Linux Kernel 2.2.23 rc2
Linux Kernel 2.2.24
Linux Kernel 2.2.24
Linux Kernel 2.2.24 rc2
Linux Kernel 2.2.24 rc3
Linux Kernel 2.2.24 rc4
Linux Kernel 2.2.24 rc5
Linux Kernel 2.2.2
Linux Kernel 2.2.3
Linux Kernel 2.2.4
Linux Kernel 2.2.4
Linux Kernel 2.2.4 rc1
Linux Kernel 2.2.5
Linux Kernel 2.2.6
Linux Kernel 2.2.7
Linux Kernel 2.2.8
Linux Kernel 2.2.9
Linux Kernel 2.4.0
Linux Kernel 2.4.0
Linux Kernel 2.4.0 test10
Linux Kernel 2.4.0 test11
Linux Kernel 2.4.0 test12
Linux Kernel 2.4.0 test1
Linux Kernel 2.4.0 test2
Linux Kernel 2.4.0 test3
Linux Kernel 2.4.0 test4
Linux Kernel 2.4.0 test5
Linux Kernel 2.4.0 test6
Linux Kernel 2.4.0 test7
Linux Kernel 2.4.0 test8
Linux Kernel 2.4.0 test9
Linux Kernel 2.4.10
Linux Kernel 2.4.11
Linux Kernel 2.4.11
Linux Kernel 2.4.11 pre3
Linux Kernel 2.4.12
Linux Kernel 2.4.13
Linux Kernel 2.4.14
Linux Kernel 2.4.15
Linux Kernel 2.4.16
Linux Kernel 2.4.17
Linux Kernel 2.4.18
Linux Kernel 2.4.18
Linux Kernel 2.4.18 pre1
Linux Kernel 2.4.18 pre2
Linux Kernel 2.4.18 pre3
Linux Kernel 2.4.18 pre4
Linux Kernel 2.4.18 pre5
Linux Kernel 2.4.18 pre6
Linux Kernel 2.4.18 pre7
Linux Kernel 2.4.18 pre8
Linux Kernel 2.4.18 pre9
Linux Kernel 2.4.19
Linux Kernel 2.4.19
Linux Kernel 2.4.19 pre1
Linux Kernel 2.4.19 pre2
Linux Kernel 2.4.19 pre3
Linux Kernel 2.4.19 pre4
Linux Kernel 2.4.19 pre5
Linux Kernel 2.4.19 pre6
Linux Kernel 2.4.1
Linux Kernel 2.4.20
Linux Kernel 2.4.21 pre1
Linux Kernel 2.4.2
Linux Kernel 2.4.3
Linux Kernel 2.4.3
Linux Kernel 2.4.3 pre3
Linux Kernel 2.4.4
Linux Kernel 2.4.5
Linux Kernel 2.4.6
Linux Kernel 2.4.7
Linux Kernel 2.4.8
Linux Kernel 2.4.9
Questions to Ask Vendors
Can you confirm whether your systems are affected by CVE-2003-0127, and if so, what steps are you currently taking to mitigate this vulnerability?
What is your estimated timeline for fully resolving CVE-2003-0127 in your products or services, and how will you communicate updates on this issue to us as your customer?