Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
Multiple overflows exist in the io_edgeport driver which might be usable
as a denial of service attack vector.
Bryan Fulton reported a bounds checking bug in the coda_pioctl function
which may permit local users to execute arbitrary code or trigger a denial
of service attack.
An error in the skb_checksum_help() function from the netfilter framework
has been discovered that permits the bypass of packet filter rules or
a denial of service attack.
Tim Yamin discovered that insufficient input validation in the zisofs driver
for compressed ISO file systems permits a denial of service attack through
maliciously crafted ISO images.
A buffer overflow in the sendmsg() function permits local users to execute
Herbert Xu discovered that the setsockopt() function was not restricted to
users/processes with the CAP_NET_ADMIN capability. This permits attackers to
manipulate IPSEC policies or initiate a denial of service attack.
Al Viro discovered a race condition in the /proc handling of network devices.
A (local) attacker could exploit the stale reference after interface shutdown
to cause a denial of service or possibly execute code in kernel mode.
Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices
leak memory, which permits a denial of service attack.
Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code
can be forced into an endless loop, which permits a denial of service attack.
Vasiliy Averin discovered that the reference counters from sockfd_put() and
fput() can be forced into overlapping, which permits a denial of service attack
through a null pointer dereference.
Eric Dumazet discovered that the set_mempolicy() system call accepts a negative
value for its first argument, which triggers a BUG() assert. This permits a
denial of service attack.
Harald Welte discovered that if a process issues a USB Request Block (URB)
to a device and terminates before the URB completes, a stale pointer
would be dereferenced. This could be used to trigger a denial of service
Pavel Roskin discovered that the driver for Orinoco wireless cards clears
its buffers insufficiently. This could leak sensitive information into
Robert Derr discovered that the audit subsystem uses an incorrect function to
free memory, which permits a denial of service attack.
Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.
Doug Chapman discovered that the mq_open syscall can be tricked into
decrementing an internal counter twice, which permits a denial of service attack
through a kernel panic.
Doug Chapman discovered that pass
Solution : http://www.debian.org/security/2006/dsa-1017
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi
|Dell PowerEdge R710 2x X5650 2.66GHz 6 Core 128GB 6x 146GB 15K SAS PERC 6/i
|Dell PowerEdge R710 2x X5650 2.66GHz 6 Core 96GB 6x 450GB 15K SAS PERC H700
|Dell PowerEdge R710 2x X5690 3.46GHz 6 Core 32GB 6x 600GB 15K SAS PERC H700
|Dell PowerEdge R720 2x E5-2680 v2 2.8Ghz 10 Core 384GB 8x 1TB 7.2K SAS H710
No Discussions have been posted on this vulnerability.