Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56598
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2006:044 (kernel)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to kernel
announced via advisory MDKSA-2006:044.

A number of vulnerabilities have been discovered and corrected in the
Linux 2.4 kernel:

A numeric casting discrepancy in sdla_xfer could allow a local user to
read portions of kernel memory via a large len argument
(CVE-2004-2607).

The traps.c file executes stack segment faults on an exception stack,
which could allow a local user to cause an oops and stack fault
exception (CVE-2005-1767).

The find_target function in ptrace32.c does not properly handle a NULL
return value from another function, allowing local users to cause a
kernel crash/oops by running a 32-bit ltrace program with the -i option
on a 64-bit executable program (CVE-2005-2553).

A race condition in ip_vs_conn_flush, when running on SMP systems,
could allow a local attacker to cause null dereference DoS by causing
a connection timer to expire while the connection table is being
flushed before the appropriate lock is acquired (CVE-2005-3274).

The NAT code in ip_nat_proto_tcp.c and ip_nat_proto_udp.c incorrectly
declares a variable to be static, which could allow a remote attacker
to cause a Denial of Service via memory corruption by causing two
packets for the same protocol to be NATed at the same time
(CVE-2005-3275).

The IPv6 flowlabel handling code modified the wrong variable in certain
circumstances, which could allow a local user to corrupt kernel memory
or cause a Denial of Service (crash) by triggering a free of non-
allocated memory (CVE-2005-3806).

The wan/sdla.c file does not require CAP_SYS_RAWIO privilege for an
SDLA firmware upgrade with unknown impact and local attack vectors
(CVE-2006-0096).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: Corporate 2.1, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2006:044

Risk factor : High

CVSS Score:
7.2

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2004-2607
BugTraq ID: 16759
http://www.securityfocus.com/bid/16759
Debian Security Information: DSA-1018 (Google Search)
http://www.debian.org/security/2006/dsa-1018
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0313.html
http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0743.html
http://secunia.com/advisories/18977
http://secunia.com/advisories/19369
Common Vulnerability Exposure (CVE) ID: CVE-2005-1767
14467
http://www.securityfocus.com/bid/14467
17002
http://secunia.com/advisories/17002
18056
http://secunia.com/advisories/18056
18059
http://secunia.com/advisories/18059
18977
ADV-2005-1878
http://www.vupen.com/english/advisories/2005/1878
DSA-921
http://www.debian.org/security/2005/dsa-921
DSA-922
http://www.debian.org/security/2005/dsa-922
MDKSA-2006:044
RHSA-2005:663
http://www.redhat.com/support/errata/RHSA-2005-663.html
SUSE-SA:2005:044
http://www.novell.com/linux/security/advisories/2005_44_kernel.html
USN-187-1
http://www.ubuntu.com/usn/usn-187-1
http://kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=51e31546a2fc46cb978da2ee0330a6a68f07541e
oval:org.mitre.oval:def:11101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11101
Common Vulnerability Exposure (CVE) ID: CVE-2005-2553
14965
http://www.securityfocus.com/bid/14965
19038
http://secunia.com/advisories/19038
FLSA:157459-2
http://www.securityfocus.com/archive/1/428058/100/0/threaded
SUSE-SA:2006:012
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
http://linux.bkbits.net:8080/linux-2.4/cset%4041dd3455GwQPufrGvBJjcUOXQa3WXA
http://lkml.org/lkml/2005/1/5/245
oval:org.mitre.oval:def:9647
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9647
Common Vulnerability Exposure (CVE) ID: CVE-2005-3274
BugTraq ID: 15528
http://www.securityfocus.com/bid/15528
Debian Security Information: DSA-922 (Google Search)
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://secunia.com/advisories/17826
http://secunia.com/advisories/18684
https://usn.ubuntu.com/219-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-3275
BugTraq ID: 15531
http://www.securityfocus.com/bid/15531
Debian Security Information: DSA-921 (Google Search)
http://www.securityfocus.com/archive/1/428028/100/0/threaded
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142
http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/17918
http://secunia.com/advisories/18562
http://secunia.com/advisories/19185
http://secunia.com/advisories/19607
SGI Security Advisory: 20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Common Vulnerability Exposure (CVE) ID: CVE-2005-3806
BugTraq ID: 15729
http://www.securityfocus.com/bid/15729
Debian Security Information: DSA-1017 (Google Search)
http://www.debian.org/security/2006/dsa-1017
http://www.mandriva.com/security/advisories?name=MDKSA-2006:018
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9903
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://secunia.com/advisories/17917
http://secunia.com/advisories/18203
http://secunia.com/advisories/18510
http://secunia.com/advisories/19374
SuSE Security Announcement: SUSE-SA:2005:067 (Google Search)
http://www.securityfocus.com/advisories/9806
https://usn.ubuntu.com/231-1/
Common Vulnerability Exposure (CVE) ID: CVE-2006-0096
BugTraq ID: 16304
http://www.securityfocus.com/bid/16304
http://secunia.com/advisories/18527
https://usn.ubuntu.com/244-1/
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.