{"vuid":"VU#301156","idnumber":"301156","name":"Linux kernel do_brk() function contains integer overflow","keywords":["Linux kernel","do_brk() function","integer overflow"],"overview":"A  vulnerability in the linux kernel may permit a local user to gain elevated privileges.","clean_desc":"Versions of the Linux kernel prior to 2.4.23 an integer overflow vulnerability in the brk system call (do_brk() function). This vulnerability may be exploited by a local user to gain elevated or root privileges. An exploit for this vulnerability exists, and has been used to compromise systems.","impact":"A local user on the system can exploit this vulnerability to gain access to the kernel address space and gain elevated privileges.","resolution":"This vulnerability has been resolved in versions 2.4.23 for the 2.4 kernel tree, and the 2.6.0-test6 kernel tree. Please check the \"Systems Affected\" section for vendor-specific releases.","workarounds":"","sysaffected":"","thanks":"Thanks to Wichert Akkerman for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.secunia.com/advisories/10328/","http://www.secunia.com/advisories/10329/","http://www.secunia.com/advisories/10333/","http://www.secunia.com/advisories/10330/","http://www.secunia.com/advisories/10338/"],"cveids":["CVE-2003-0961"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-12-01T21:23:58Z","publicdate":"2003-12-01T00:00:00Z","datefirstpublished":"2003-12-02T19:53:34Z","dateupdated":"2003-12-02T20:03:22Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"12","cam_internetinfrastructure":"15","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"23.625","cam_scorecurrentwidelyknown":"26.4375","cam_scorecurrentwidelyknownexploited":"30.9375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":23.625,"vulnote":null}