Vulnerability Details : CVE-2003-0018
Linux kernel 2.4.10 through 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption.
Products affected by CVE-2003-0018
- cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
Threat overview for CVE-2003-0018
Top countries where our scanners detected CVE-2003-0018
Top open port discovered on systems with this issue
80
IPs affected by CVE-2003-0018 3
Find out if you* are
affected by CVE-2003-0018!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-0018
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0018
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:P |
3.9
|
4.9
|
NIST |
References for CVE-2003-0018
-
http://www.securityfocus.com/bid/6763
-
http://www.iss.net/security_center/static/11249.php
Vendor Advisory
-
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:014
-
http://www.debian.org/security/2003/dsa-358
-
http://linux.bkbits.net:8080/linux-2.4/cset@3e2f193drGJDBg9SG6JwaDQwCBnAMQ
-
http://www.redhat.com/support/errata/RHSA-2003-025.html
Patch;Vendor Advisory
-
http://www.debian.org/security/2004/dsa-423
Patch;Vendor Advisory
Jump to