Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.002
EPSS Ranking
37.2%
CVSS Severity
CVSS v2 Score
2.1
References
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
http://www.novell.com/linux/security/advisories/2004_20_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-354.html
http://www.redhat.com/support/errata/RHSA-2004-360.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/16599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
http://www.novell.com/linux/security/advisories/2004_20_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-354.html
http://www.redhat.com/support/errata/RHSA-2004-360.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/16599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867
Products affected by CVE-2004-0497
Mandrakesoft
»
Mandrake Multi Network Firewall
»
Version:
8.2
cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2
Conectiva
»
Linux
»
Version:
10
cpe:2.3:o:conectiva:linux:10
Gentoo
»
Linux
»
Version:
N/A
cpe:2.3:o:gentoo:linux:-
Gentoo
»
Linux
»
Version:
1.2
cpe:2.3:o:gentoo:linux:1.2
Gentoo
»
Linux
»
Version:
1.4
cpe:2.3:o:gentoo:linux:1.4
Gentoo
»
Linux
»
Version:
2.1.30
cpe:2.3:o:gentoo:linux:2.1.30
Gentoo
»
Linux
»
Version:
2.2.28
cpe:2.3:o:gentoo:linux:2.2.28
Gentoo
»
Linux
»
Version:
2.3.30
cpe:2.3:o:gentoo:linux:2.3.30
Linux
»
Linux Kernel
»
Version:
2.0
cpe:2.3:o:linux:linux_kernel:2.0
Mandrakesoft
»
Mandrake Linux
»
Version:
10.0
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0
Mandrakesoft
»
Mandrake Linux
»
Version:
9.1
cpe:2.3:o:mandrakesoft:mandrake_linux:9.1
Mandrakesoft
»
Mandrake Linux
»
Version:
9.2
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
2.1
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1
Redhat
»
Enterprise Linux
»
Version:
2.1
cpe:2.3:o:redhat:enterprise_linux:2.1
Redhat
»
Enterprise Linux
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux:3.0
Suse
»
Suse Linux
»
Version:
8.0
cpe:2.3:o:suse:suse_linux:8.0
Suse
»
Suse Linux
»
Version:
8.1
cpe:2.3:o:suse:suse_linux:8.1
Suse
»
Suse Linux
»
Version:
8.2
cpe:2.3:o:suse:suse_linux:8.2
Suse
»
Suse Linux
»
Version:
9.0
cpe:2.3:o:suse:suse_linux:9.0
Suse
»
Suse Linux
»
Version:
9.1
cpe:2.3:o:suse:suse_linux:9.1
Trustix
»
Secure Linux
»
Version:
2
cpe:2.3:o:trustix:secure_linux:2
Trustix
»
Secure Linux
»
Version:
2.0
cpe:2.3:o:trustix:secure_linux:2.0
Trustix
»
Secure Linux
»
Version:
2.1
cpe:2.3:o:trustix:secure_linux:2.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved