| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.1 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Linux Kernel and classified as problematic. This issue affects some unknown processing of the component /dev/rtc. Executing a manipulation can lead to information disclosure. This vulnerability is handled as CVE-2003-0984. The attack can only be done within the local network. There is not any exploit available. It is suggested to upgrade the affected component.
Details
A vulnerability was found in Linux Kernel (Operating System). It has been declared as problematic. This vulnerability affects an unknown code of the component /dev/rtc. The manipulation with an unknown input leads to a information disclosure vulnerability. The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. As an impact it is known to affect confidentiality. CVE summarizes:
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.
The bug was discovered 12/04/2003. The weakness was released 01/05/2004 by trini (Website). The advisory is available at kernel.org. This vulnerability was named CVE-2003-0984 since 12/16/2003. The attack needs to be initiated within the local network. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1592 by the MITRE ATT&CK project.
The vulnerability was handled as a non-public zero-day exploit for at least 32 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 13669 (Fedora Core 1 : kernel-2.4.22-1.2138.nptl (2003-046)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Fedora Local Security Checks and running in the context l.
Upgrading to version 2.4.24 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at kernel.org. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published 3 years after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (13943), Tenable (13669), SecurityFocus (BID 9154†), OSVDB (3317†) and Secunia (SA20338†). Additional details are provided at vuldb.com. Entry connected to this vulnerability is available at VDB-465. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
- 2.4.0
- 2.4.1
- 2.4.2
- 2.4.3
- 2.4.4
- 2.4.5
- 2.4.6
- 2.4.7
- 2.4.8
- 2.4.9
- 2.4.10
- 2.4.11
- 2.4.12
- 2.4.13
- 2.4.14
- 2.4.15
- 2.4.16
- 2.4.17
- 2.4.18
- 2.4.19
- 2.4.20
- 2.4.21
- 2.4.22
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.1
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 13669
Nessus Name: Fedora Core 1 : kernel-2.4.22-1.2138.nptl (2003-046)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 56784
OpenVAS Name: Debian Security Advisory DSA 1067-1 (kernel 2.4.16)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Kernel 2.4.24
Patch: kernel.org
Timeline
12/04/2003 🔍12/04/2003 🔍
12/16/2003 🔍
01/05/2004 🔍
01/05/2004 🔍
01/05/2004 🔍
01/05/2004 🔍
01/05/2004 🔍
01/06/2004 🔍
07/23/2004 🔍
10/18/2004 🔍
05/20/2006 🔍
05/31/2006 🔍
03/09/2021 🔍
Sources
Vendor: kernel.orgAdvisory: kernel.org
Researcher: trini
Status: Confirmed
CVE: CVE-2003-0984 (🔍)
GCVE (CVE): GCVE-0-2003-0984
GCVE (VulDB): GCVE-100-466
OVAL: 🔍
X-Force: 13943 - Linux kernel RTC memory link, Medium Risk
SecurityFocus: 9154 - Linux Kernel 2.4 RTC Handling Routines Memory Disclosure Vulnerability
Secunia: 20338 - Debian update for kernel-source-2.4.17, Moderately Critical
OSVDB: 3317 - Linux Kernel Real Time Clock Kernel Memory Disclosure
SecurityTracker: 1008594 - Linux Kernel Real-time Clock Routines May Leak Kernel Data to User Applications
Vulnerability Center: 5600 - Linux Kernel Real Time Clock (RTC) Routine Leakage of Kernel Data, Low
Misc.: 🔍
See also: 🔍
Entry
Created: 01/06/2004 14:24Updated: 03/09/2021 09:56
Changes: 01/06/2004 14:24 (101), 10/08/2018 15:43 (5), 03/09/2021 09:56 (2)
Complete: 🔍
Cache ID: 216:68B:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.

No comments yet. Languages: en.
Please log in to comment.