CVE-2004-1333 (CNNVD-200412-062)

LOW 有利用代码
中文标题:
Linux Kernel多个本地漏洞
英文标题:
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows loca...
CVSS分数: 2.1
发布时间: 2005-01-06 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Linux kernel 2.6.10以前的2.4和2.6版本中vc_resize函数存在整数溢出漏洞。本地用户借助超短新屏幕值导致服务拒绝,从而引发缓冲区溢出漏洞。

英文描述:

Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.

CWE类型:
(暂无数据)
标签:
dos linux Georgi Guninski OSVDB-12479
受影响产品
厂商 产品 版本 版本范围 平台 CPE
linux linux_kernel 2.4.0 - - cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
linux linux_kernel 2.4.1 - - cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
linux linux_kernel 2.4.2 - - cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
linux linux_kernel 2.4.3 - - cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
linux linux_kernel 2.4.4 - - cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
linux linux_kernel 2.4.5 - - cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
linux linux_kernel 2.4.6 - - cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
linux linux_kernel 2.4.7 - - cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
linux linux_kernel 2.4.8 - - cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
linux linux_kernel 2.4.9 - - cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
linux linux_kernel 2.4.10 - - cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
linux linux_kernel 2.4.11 - - cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
linux linux_kernel 2.4.12 - - cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
linux linux_kernel 2.4.13 - - cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
linux linux_kernel 2.4.14 - - cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
linux linux_kernel 2.4.15 - - cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
linux linux_kernel 2.4.16 - - cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
linux linux_kernel 2.4.17 - - cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
linux linux_kernel 2.4.18 - - cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
linux linux_kernel 2.4.19 - - cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
linux linux_kernel 2.4.20 - - cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
linux linux_kernel 2.4.21 - - cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
linux linux_kernel 2.4.22 - - cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
linux linux_kernel 2.4.23 - - cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
linux linux_kernel 2.4.23_ow2 - - cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
linux linux_kernel 2.4.24 - - cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
linux linux_kernel 2.4.24_ow1 - - cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
linux linux_kernel 2.4.25 - - cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
linux linux_kernel 2.4.26 - - cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
linux linux_kernel 2.4.27 - - cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
linux linux_kernel 2.4.28 - - cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
linux linux_kernel 2.6.0 - - cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
linux linux_kernel 2.6.1 - - cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
linux linux_kernel 2.6.2 - - cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
linux linux_kernel 2.6.3 - - cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
linux linux_kernel 2.6.4 - - cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
linux linux_kernel 2.6.5 - - cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
linux linux_kernel 2.6.6 - - cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
linux linux_kernel 2.6.7 - - cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
linux linux_kernel 2.6.8 - - cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
linux linux_kernel 2.6.9 - - cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
linux linux_kernel 2.6.10 - - cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
linux linux_kernel 2.6_test9_cvs - - cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*
redhat fedora_core core_1.0 - - cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
redhat fedora_core core_2.0 - - cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
redhat fedora_core core_3.0 - - cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
redhat linux 7.3 - - cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
redhat linux 9.0 - - cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20163 third-party-advisory
cve.org
访问
20041215 fun with linux kernel mailing-list
cve.org
访问
USN-47-1 vendor-advisory
cve.org
访问
linux-vcresize-dos(18523) vdb-entry
cve.org
访问
DSA-1082 vendor-advisory
cve.org
访问
SUSE-SA:2005:018 vendor-advisory
cve.org
访问
DSA-1070 vendor-advisory
cve.org
访问
20162 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
11956 vdb-entry
cve.org
访问
MDKSA-2005:218 vendor-advisory
cve.org
访问
DSA-1067 vendor-advisory
cve.org
访问
DSA-1069 vendor-advisory
cve.org
访问
17826 third-party-advisory
cve.org
访问
FLSA:152532 vendor-advisory
cve.org
访问
MDKSA-2005:219 vendor-advisory
cve.org
访问
20202 third-party-advisory
cve.org
访问
20338 third-party-advisory
cve.org
访问
ExploitDB EDB-690 EXPLOIT
exploitdb
访问
Download Exploit EDB-690 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2004-1333 ADVISORY
cve.org
访问
CVSS评分详情
2.1
LOW
CVSS向量: AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
PARTIAL
时间信息
发布时间:
2005-01-06 05:00:00
修改时间:
2024-08-08 00:46:12
创建时间:
2025-11-11 15:32:22
更新时间:
2026-01-26 02:18:25
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-1333 2025-11-11 15:17:30 2025-11-11 07:32:22
NVD nvd_CVE-2004-1333 2025-11-11 14:50:55 2025-11-11 07:41:08
CNNVD cnnvd_CNNVD-200412-062 2025-11-11 15:08:45 2025-11-11 07:48:54
EXPLOITDB exploitdb_EDB-690 2025-11-11 15:05:24 2025-11-11 09:03:29
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 17:03:29
references_count: 18 → 21; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 18 -> 21
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:54
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200412-062; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200412-062
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:08
severity: SeverityLevel.MEDIUM → SeverityLevel.LOW; cvss_score: 未提取 → 2.1; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:N/I:N/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 48; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.LOW
  • cvss_score: 未提取 -> 2.1
  • cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:N/I:N/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 48
  • data_sources: ['cve'] -> ['cve', 'nvd']