Show plain JSON{"id": "CVE-2004-0997", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"url": "http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20162", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20163", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20202", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20338", "source": "cve@mitre.org"}, {"url": "http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&rev=0&sc=0", "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2006/dsa-1067", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2006/dsa-1069", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2006/dsa-1070", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2006/dsa-1082", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/18176", "source": "cve@mitre.org"}, {"url": "http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20162", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20163", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20202", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20338", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&rev=0&sc=0", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2006/dsa-1067", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2006/dsa-1069", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2006/dsa-1070", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2006/dsa-1082", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/18176", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E244C37-E366-482E-9173-9376D0839839"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11F96BB9-6509-4F1E-9590-E55EE8C6F992"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "718D4631-440E-4783-8966-B2A2D3EF89B3"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7015F57A-1E3B-42D2-9D12-F695078EFB21"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "467721EE-5130-46C5-BBB7-0F4878F3F171"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "171257E7-12C5-4283-88F7-FFE643995563"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0887E02F-9F36-41F0-9F75-060B8414D7BF"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org", "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nLinux, Linux kernel, 2.4.17"}