Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-183: kernel

Vulnerability Assessment Details

RHSA-2004-183: kernel

Vulnerability Assessment Summary
Check for the version of the kernel packages

Detailed Explanation for this Vulnerability Assessment

Updated kernel packages that fix two privilege escalation vulnerabilities
are now available.

The Linux kernel handles the basic functions of the operating system.

iSEC Security Research discovered a flaw in the ip_setsockopt() function
code of the Linux kernel versions 2.4.22 to 2.4.25 inclusive. This flaw
also affects the 2.4.21 kernel in Red Hat Enterprise Linux 3 which
contained a backported version of the affected code. A local user could
use this flaw to gain root rights. The Common Vulnerabilities and
Exposures project ( has assigned the name CVE-2004-0424 to
this issue.

iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.
A possible hacker could create a malicious filesystem in such a way that root
rights may be obtained if the filesystem is mounted. The Common
Vulnerabilities and Exposures project ( has assigned the name
CVE-2004-0109 to this issue.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.