English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 90895 Descripciones CVE y
50192 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.61775
Categoría:Debian Local Security Checks
Título:Debian Security Advisory DSA 1653-1 (linux-2.6)
Resumen:Debian Security Advisory DSA 1653-1 (linux-2.6)
Descripción:Description:
The remote host is missing an update to linux-2.6
announced via advisory DSA 1653-1.

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2007-6716

Joe Jin reported a local denial of service vulnerability that
allows system users to trigger an oops due to an improperly
initialized data structure.

CVE-2008-1514

Jan Kratochvil reported a local denial of service vulnerability in
the ptrace interface for the s390 architecture. Local users can
trigger an invalid pointer dereference, leading to a system panic.

CVE-2008-3276

Eugene Teo reported an integer overflow in the DCCP subsystem that
may allow remote attackers to cause a denial of service in the
form of a kernel panic.

CVE-2008-3525

Eugene Teo reported a lack of capability checks in the kernel
driver for Granch SBNI12 leased line adapters (sbni), allowing
local users to perform privileged operations.

CVE-2008-3833

The S_ISUID/S_ISGID bits were not being cleared during an inode
splice, which, under certain conditions, can be exploited by local
users to obtain the privileges of a group for which they are not a
member. Mark Fasheh reported this issue.

CVE-2008-4210

David Watson reported an issue in the open()/creat() system calls
which, under certain conditions, can be exploited by local users
to obtain the privileges of a group for which they are not a
member.

CVE-2008-4302

A coding error in the splice subsystem allows local users to
attempt to unlock a page structure that has not been locked,
resulting in a system crash.

For the stable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-22etch3.

We recommend that you upgrade your linux-2.6, fai-kernels, and

Solution:
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201653-1

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-6716
http://lkml.org/lkml/2007/7/30/448
http://www.openwall.com/lists/oss-security/2008/09/04/1
Debian Security Information: DSA-1653 (Google Search)
http://www.debian.org/security/2008/dsa-1653
http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
http://www.redhat.com/support/errata/RHSA-2008-0885.html
RedHat Security Advisories: RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
SuSE Security Announcement: SUSE-SA:2008:056 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
SuSE Security Announcement: SUSE-SA:2008:047 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
SuSE Security Announcement: SUSE-SA:2008:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
SuSE Security Announcement: SUSE-SA:2008:052 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
http://www.ubuntu.com/usn/usn-659-1
BugTraq ID: 31515
http://www.securityfocus.com/bid/31515
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10053
http://secunia.com/advisories/32023
http://secunia.com/advisories/32393
http://secunia.com/advisories/32799
http://secunia.com/advisories/32759
http://secunia.com/advisories/32103
http://secunia.com/advisories/32237
http://secunia.com/advisories/32356
http://secunia.com/advisories/32370
Common Vulnerability Exposure (CVE) ID: CVE-2008-1514
http://sourceware.org/systemtap/wiki/utrace/tests
Debian Security Information: DSA-1655 (Google Search)
http://www.debian.org/security/2008/dsa-1655
BugTraq ID: 31177
http://www.securityfocus.com/bid/31177
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9555
http://secunia.com/advisories/31826
http://secunia.com/advisories/32315
XForce ISS Database: linux-kernel-ptrace-dos(41501)
http://xforce.iss.net/xforce/xfdb/41501
Common Vulnerability Exposure (CVE) ID: CVE-2008-3276
http://www.openwall.com/lists/oss-security/2008/08/15/3
Debian Security Information: DSA-1636 (Google Search)
http://www.debian.org/security/2008/dsa-1636
http://www.redhat.com/support/errata/RHSA-2008-0857.html
http://www.redhat.com/support/errata/RHSA-2008-0957.html
BugTraq ID: 30704
http://www.securityfocus.com/bid/30704
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11506
http://www.vupen.com/english/advisories/2008/2406
http://www.securitytracker.com/id?1020705
http://secunia.com/advisories/31509
http://secunia.com/advisories/31881
http://secunia.com/advisories/32190
http://secunia.com/advisories/31836
http://secunia.com/advisories/32485
Common Vulnerability Exposure (CVE) ID: CVE-2008-3525
http://www.openwall.com/lists/oss-security/2008/08/29/2
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:223
http://www.redhat.com/support/errata/RHSA-2008-0973.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
SuSE Security Announcement: SUSE-SA:2008:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
SuSE Security Announcement: SUSE-SA:2008:049 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5671
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9364
http://www.vupen.com/english/advisories/2008/2511
http://www.vupen.com/english/advisories/2008/2714
http://www.securitytracker.com/id?1020969
http://secunia.com/advisories/32386
http://secunia.com/advisories/33201
http://secunia.com/advisories/33280
Common Vulnerability Exposure (CVE) ID: CVE-2008-3833
http://openwall.com/lists/oss-security/2008/10/03/1
BugTraq ID: 31567
http://www.securityfocus.com/bid/31567
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9980
XForce ISS Database: kernel-genericfilesplice-priv-escalation(45922)
http://xforce.iss.net/xforce/xfdb/45922
Common Vulnerability Exposure (CVE) ID: CVE-2008-4210
http://www.openwall.com/lists/oss-security/2008/09/24/5
http://www.openwall.com/lists/oss-security/2008/09/24/8
SuSE Security Announcement: SUSE-SA:2008:057 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
http://www.ubuntu.com/usn/usn-679-1
BugTraq ID: 31368
http://www.securityfocus.com/bid/31368
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6386
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9511
http://secunia.com/advisories/32918
http://secunia.com/advisories/32344
XForce ISS Database: linux-kernel-open-privilege-escalation(45539)
http://xforce.iss.net/xforce/xfdb/45539
Common Vulnerability Exposure (CVE) ID: CVE-2008-4302
http://lkml.org/lkml/2007/7/20/168
http://www.openwall.com/lists/oss-security/2008/09/16/10
http://www.juniper.net/security/auto/vulnerabilities/vuln31201.html
BugTraq ID: 31201
http://www.securityfocus.com/bid/31201
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10547
XForce ISS Database: linux-kernel-addtopagecachelru-dos(45191)
http://xforce.iss.net/xforce/xfdb/45191
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 50192 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Developer APIs | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2016 E-Soft Inc. Todos los derechos reservados.