English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 92446 Descripciones CVE y
51095 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.62843
Categoría:Debian Local Security Checks
Título:Debian Security Advisory DSA 1681-1 (linux-2.6.24)
Resumen:Debian Security Advisory DSA 1681-1 (linux-2.6.24)
Descripción:Description:
The remote host is missing an update to linux-2.6.24
announced via advisory DSA 1681-1.

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2008-3528

Eugene Teo reported a local DoS issue in the ext2 and ext3
filesystems. Local users who have been granted the privileges
necessary to mount a filesystem would be able to craft a corrupted
filesystem that causes the kernel to output error messages in an
infinite loop.

CVE-2008-4554

Milos Szeredi reported that the usage of splice() on files opened
with O_APPEND allows users to write to the file at arbitrary
offsets, enabling a bypass of possible assumed semantics of the
O_APPEND flag.

CVE-2008-4576

Vlad Yasevich reported an issue in the SCTP subsystem that may
allow remote users to cause a local DoS by triggering a kernel
oops.

CVE-2008-4618

Wei Yongjun reported an issue in the SCTP subsystem that may allow
remote users to cause a local DoS by triggering a kernel panic.

CVE-2008-4933

Eric Sesterhenn reported a local DoS issue in the hfsplus
filesystem. Local users who have been granted the privileges
necessary to mount a filesystem would be able to craft a corrupted
filesystem that causes the kernel to overrun a buffer, resulting
in a system oops or memory corruption.

CVE-2008-4934

Eric Sesterhenn reported a local DoS issue in the hfsplus
filesystem. Local users who have been granted the privileges
necessary to mount a filesystem would be able to craft a corrupted
filesystem that results in a kernel oops due to an unchecked
return value.

CVE-2008-5025

Eric Sesterhenn reported a local DoS issue in the hfs filesystem.
Local users who have been granted the privileges necessary to
mount a filesystem would be able to craft a filesystem with a
corrupted catalog name length, resulting in a system oops or
memory corruption.

CVE-2008-5029

Andrea Bittau reported a DoS issue in the unix socket subsystem
that allows a local user to cause memory corruption, resulting in
a kernel panic.

CVE-2008-5134

Johannes Berg reported a remote DoS issue in the libertas wireless
driver, which can be triggered by a specially crafted beacon/probe
response.

CVE-2008-5182

Al Viro reported race conditions in the inotify subsystem that may
allow local users to acquire elevated privileges.

CVE-2008-5300

Dann Frazier reported a DoS condition that allows local users to
cause the out of memory handler to kill off privileged processes
or trigger soft lockups due to a starvation issue in the unix
socket subsystem.

For the stable distribution (etch), these problems have been fixed in
version 2.6.24-6~
etchnhalf.7.

We recommend that you upgrade your linux-2.6.24 packages.

Solution:
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201681-1

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-3528
Bugtraq: 20081112 rPSA-2008-0316-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498285/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://lkml.org/lkml/2008/9/13/98
http://lkml.org/lkml/2008/9/13/99
http://lkml.org/lkml/2008/9/17/371
http://www.openwall.com/lists/oss-security/2008/09/18/2
Debian Security Information: DSA-1687 (Google Search)
http://www.debian.org/security/2008/dsa-1687
Debian Security Information: DSA-1681 (Google Search)
http://www.debian.org/security/2008/dsa-1681
http://www.mandriva.com/security/advisories?name=MDVSA-2008:224
RedHat Security Advisories: RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
http://www.redhat.com/support/errata/RHSA-2009-0009.html
http://www.redhat.com/support/errata/RHSA-2009-0326.html
SuSE Security Announcement: SUSE-SA:2008:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
SuSE Security Announcement: SUSE-SA:2008:057 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
SuSE Security Announcement: SUSE-SA:2008:056 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
SuSE Security Announcement: SUSE-SA:2008:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
SuSE Security Announcement: SUSE-SA:2008:052 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
http://www.ubuntu.com/usn/usn-662-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10852
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8642
http://secunia.com/advisories/32509
http://secunia.com/advisories/32709
http://secunia.com/advisories/32799
http://secunia.com/advisories/32759
http://secunia.com/advisories/33180
http://secunia.com/advisories/32998
http://secunia.com/advisories/33586
http://secunia.com/advisories/33758
http://secunia.com/advisories/37471
http://secunia.com/advisories/32356
http://secunia.com/advisories/32370
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: kernel-errorreporting-dos(45720)
http://xforce.iss.net/xforce/xfdb/45720
Common Vulnerability Exposure (CVE) ID: CVE-2008-4554
http://www.openwall.com/lists/oss-security/2008/10/13/1
http://www.openwall.com/lists/oss-security/2008/10/14/5
https://bugzilla.redhat.com/show_bug.cgi?id=466707
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html
http://www.redhat.com/support/errata/RHSA-2008-1017.html
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
http://www.ubuntu.com/usn/usn-679-1
BugTraq ID: 31903
http://www.securityfocus.com/bid/31903
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11142
http://secunia.com/advisories/32386
http://secunia.com/advisories/32918
http://secunia.com/advisories/33182
http://secunia.com/advisories/35390
XForce ISS Database: linux-kernel-dosplicefrom-security-bypass(45954)
http://xforce.iss.net/xforce/xfdb/45954
Common Vulnerability Exposure (CVE) ID: CVE-2008-4576
http://www.gossamer-threads.com/lists/linux/kernel/981012?page=last
http://permalink.gmane.org/gmane.comp.security.oss.general/1039
BugTraq ID: 31634
http://www.securityfocus.com/bid/31634
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9822
XForce ISS Database: linux-kernel-sctp-initack-dos(45773)
http://xforce.iss.net/xforce/xfdb/45773
Common Vulnerability Exposure (CVE) ID: CVE-2008-4618
http://www.openwall.com/lists/oss-security/2008/10/06/1
BugTraq ID: 31848
http://www.securityfocus.com/bid/31848
Common Vulnerability Exposure (CVE) ID: CVE-2008-4933
http://www.openwall.com/lists/oss-security/2008/11/03/2
http://www.mandriva.com/security/advisories?name=MDVSA-2008:234
http://www.redhat.com/support/errata/RHSA-2009-0014.html
RedHat Security Advisories: RHSA-2009:0264
http://rhn.redhat.com/errata/RHSA-2009-0264.html
SuSE Security Announcement: SUSE-SA:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
SuSE Security Announcement: SUSE-SA:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html
BugTraq ID: 32093
http://www.securityfocus.com/bid/32093
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11061
http://secunia.com/advisories/32510
http://secunia.com/advisories/33641
http://secunia.com/advisories/33704
http://secunia.com/advisories/33556
http://secunia.com/advisories/33858
XForce ISS Database: linux-kernel-hfsplusfindcat-bo(46405)
http://xforce.iss.net/xforce/xfdb/46405
Common Vulnerability Exposure (CVE) ID: CVE-2008-4934
BugTraq ID: 32096
http://www.securityfocus.com/bid/32096
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11635
XForce ISS Database: linux-kernel-hfsplus-dos(46327)
http://xforce.iss.net/xforce/xfdb/46327
Common Vulnerability Exposure (CVE) ID: CVE-2008-5025
http://openwall.com/lists/oss-security/2008/11/10/1
http://openwall.com/lists/oss-security/2008/11/10/3
http://openwall.com/lists/oss-security/2008/11/10/6
http://openwall.com/lists/oss-security/2008/11/10/7
http://openwall.com/lists/oss-security/2008/11/11/1
http://openwall.com/lists/oss-security/2008/11/11/12
http://www.mandriva.com/security/advisories?name=MDVSA-2008:246
BugTraq ID: 32289
http://www.securityfocus.com/bid/32289
http://osvdb.org/49863
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10470
http://www.securitytracker.com/id?1021230
http://secunia.com/advisories/32719
XForce ISS Database: linux-kernel-hfscatfindbrec-bo(46605)
http://xforce.iss.net/xforce/xfdb/46605
Common Vulnerability Exposure (CVE) ID: CVE-2008-5029
Bugtraq: 20090101 Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499700/100/0/threaded
Bugtraq: 20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/512019/100/0/threaded
Bugtraq: 20090103 Re: Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499744/100/0/threaded
http://archives.neohapsis.com/archives/bugtraq/2009-01/0006.html
http://marc.info/?l=linux-netdev&m=122593044330973&w=2
http://www.openwall.com/lists/oss-security/2008/11/06/1
http://darkircop.org/unix.c
http://www.redhat.com/support/errata/RHSA-2009-0225.html
RedHat Security Advisories: RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
BugTraq ID: 32154
http://www.securityfocus.com/bid/32154
BugTraq ID: 33079
http://www.securityfocus.com/bid/33079
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11694
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9558
http://www.securitytracker.com/id?1021292
http://www.securitytracker.com/id?1021511
http://secunia.com/advisories/33623
http://securityreason.com/securityalert/4573
XForce ISS Database: linux-kernel-scmdestroy-dos(46538)
http://xforce.iss.net/xforce/xfdb/46538
Common Vulnerability Exposure (CVE) ID: CVE-2008-5134
http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
http://openwall.com/lists/oss-security/2008/11/11/2
http://www.redhat.com/support/errata/RHSA-2009-0053.html
http://www.ubuntulinux.org/support/documentation/usn/usn-714-1
BugTraq ID: 32484
http://www.securityfocus.com/bid/32484
http://secunia.com/advisories/33706
http://secunia.com/advisories/33854
Common Vulnerability Exposure (CVE) ID: CVE-2008-5182
Bugtraq: 20081209 rPSA-2008-0332-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499044/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html
http://www.ubuntu.com/usn/usn-715-1
BugTraq ID: 33503
http://www.securityfocus.com/bid/33503
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10584
http://secunia.com/advisories/33756
http://secunia.com/advisories/33348
http://secunia.com/advisories/33083
Common Vulnerability Exposure (CVE) ID: CVE-2008-5300
http://marc.info/?l=linux-netdev&m=122721862313564&w=2
http://marc.info/?l=linux-netdev&m=122765505415944&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2009:032
BugTraq ID: 32516
http://www.securityfocus.com/bid/32516
http://osvdb.org/50272
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10283
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11427
http://secunia.com/advisories/32913
http://securityreason.com/securityalert/4673
XForce ISS Database: linux-kernel-sendmsg-dos(46943)
http://xforce.iss.net/xforce/xfdb/46943
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 51095 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Developer APIs | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2016 E-Soft Inc. Todos los derechos reservados.