Vulnerability Details : CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Threat overview for CVE-2003-0127
Top countries where our scanners detected CVE-2003-0127
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2003-0127 2,354
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2003-0127!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-0127
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 12 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0127
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2003-0127
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:039
- http://www.debian.org/security/2003/dsa-311
-
http://www.debian.org/security/2003/dsa-270
- http://www.debian.org/security/2003/dsa-336
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:038
-
http://security.gentoo.org/glsa/glsa-200303-17.xml
- http://www.redhat.com/support/errata/RHSA-2003-145.html
-
http://www.debian.org/security/2003/dsa-276
-
http://rhn.redhat.com/errata/RHSA-2003-088.html
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt
- http://www.debian.org/security/2003/dsa-332
-
http://www.redhat.com/support/errata/RHSA-2003-103.html
-
http://rhn.redhat.com/errata/RHSA-2003-098.html
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254
- http://www.debian.org/security/2004/dsa-495
- http://www.debian.org/security/2004/dsa-423
- http://www.debian.org/security/2003/dsa-312
-
http://www.kb.cert.org/vuls/id/628849
Third Party Advisory;US Government Resource
-
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html
- http://marc.info/?l=bugtraq&m=105301461726555&w=2
Products affected by CVE-2003-0127
- cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*