2.1

CVE-2004-0535

The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory.  NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.

Data is provided by the National Vulnerability Database (NVD)
SuseSuse Email Server Version3.1
SuseSuse Email Server Versioniii
ConectivaLinux Version8.0
ConectivaLinux Version9.0
EngardelinuxSecure Linux Version1.5 Editionprofessional
GentooLinux Version1.4
LinuxLinux Kernel Version2.4.0
LinuxLinux Kernel Version2.4.0 Updatetest1
LinuxLinux Kernel Version2.4.0 Updatetest10
LinuxLinux Kernel Version2.4.0 Updatetest11
LinuxLinux Kernel Version2.4.0 Updatetest12
LinuxLinux Kernel Version2.4.0 Updatetest2
LinuxLinux Kernel Version2.4.0 Updatetest3
LinuxLinux Kernel Version2.4.0 Updatetest4
LinuxLinux Kernel Version2.4.0 Updatetest5
LinuxLinux Kernel Version2.4.0 Updatetest6
LinuxLinux Kernel Version2.4.0 Updatetest7
LinuxLinux Kernel Version2.4.0 Updatetest8
LinuxLinux Kernel Version2.4.0 Updatetest9
LinuxLinux Kernel Version2.4.1
LinuxLinux Kernel Version2.4.2
LinuxLinux Kernel Version2.4.3
LinuxLinux Kernel Version2.4.4
LinuxLinux Kernel Version2.4.5
LinuxLinux Kernel Version2.4.6
LinuxLinux Kernel Version2.4.7
LinuxLinux Kernel Version2.4.8
LinuxLinux Kernel Version2.4.9
LinuxLinux Kernel Version2.4.10
LinuxLinux Kernel Version2.4.11
LinuxLinux Kernel Version2.4.12
LinuxLinux Kernel Version2.4.13
LinuxLinux Kernel Version2.4.14
LinuxLinux Kernel Version2.4.15
LinuxLinux Kernel Version2.4.16
LinuxLinux Kernel Version2.4.17
LinuxLinux Kernel Version2.4.18
LinuxLinux Kernel Version2.4.18 Editionx86
LinuxLinux Kernel Version2.4.18 Updatepre1
LinuxLinux Kernel Version2.4.18 Updatepre2
LinuxLinux Kernel Version2.4.18 Updatepre3
LinuxLinux Kernel Version2.4.18 Updatepre4
LinuxLinux Kernel Version2.4.18 Updatepre5
LinuxLinux Kernel Version2.4.18 Updatepre6
LinuxLinux Kernel Version2.4.18 Updatepre7
LinuxLinux Kernel Version2.4.18 Updatepre8
LinuxLinux Kernel Version2.4.19
LinuxLinux Kernel Version2.4.19 Updatepre1
LinuxLinux Kernel Version2.4.19 Updatepre2
LinuxLinux Kernel Version2.4.19 Updatepre3
LinuxLinux Kernel Version2.4.19 Updatepre4
LinuxLinux Kernel Version2.4.19 Updatepre5
LinuxLinux Kernel Version2.4.19 Updatepre6
LinuxLinux Kernel Version2.4.20
LinuxLinux Kernel Version2.4.21
LinuxLinux Kernel Version2.4.21 Updatepre1
LinuxLinux Kernel Version2.4.21 Updatepre4
LinuxLinux Kernel Version2.4.21 Updatepre7
LinuxLinux Kernel Version2.4.22
LinuxLinux Kernel Version2.4.23
LinuxLinux Kernel Version2.4.23 Updatepre9
LinuxLinux Kernel Version2.4.23_ow2
LinuxLinux Kernel Version2.4.24
LinuxLinux Kernel Version2.4.24_ow1
LinuxLinux Kernel Version2.4.25
LinuxLinux Kernel Version2.4.26
LinuxLinux Kernel Version2.4.27 Updatepre1
MandrakesoftMandrake Linux Version9.1
MandrakesoftMandrake Linux Version9.1 Editionppc
MandrakesoftMandrake Linux Version9.2
MandrakesoftMandrake Linux Version9.2 Editionamd64
MandrakesoftMandrake Linux Version10.0
MandrakesoftMandrake Linux Version10.0 Editionamd64
MandrakesoftMandrake Linux Corporate Server Version2.1 Editionx86_64
SuseSuse Linux Version7 Editionenterprise_server
SuseSuse Linux Version8 Editionenterprise_server
SuseSuse Linux Version8.0
SuseSuse Linux Version8.0 Editioni386
SuseSuse Linux Version8.1
SuseSuse Linux Version8.2
SuseSuse Linux Version9.0
SuseSuse Linux Version9.0 Editionx86_64
SuseSuse Linux Version9.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.09% 0.229
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N