|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1069] DSA-1069-1 kernel-source-2.4.18 Vulnerability Assessment Details
|
[DSA1069] DSA-1069-1 kernel-source-2.4.18 |
||
DSA-1069-1 kernel-source-2.4.18 Detailed Explanation for this Vulnerability Assessment Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: A local denial of service vulnerability in do_fork() has been found. A local denial of service vulnerability in proc memory handling has been found. A buffer overflow in the panic handling code has been found. A local denial of service vulnerability through a null pointer dereference in the IA64 process handling code has been found. A local denial of service vulnerability through an infinite loop in the signal handler code has been found. An information leak in the context switch code has been found on the IA64 architecture. Unsafe use of copy_to_user in USB drivers may disclose sensitive information. A race condition in the i386 page fault handler may permit privilege escalation. Multiple vulnerabilities in the SMB filesystem code may permit denial of service or information disclosure. An information leak discovered in the SMB filesystem code. A local denial of service vulnerability has been found in the SCM layer. An integer overflow in the terminal code may permit a local denial of service vulnerability. A local privilege escalation in the MIPS assembly code has been found. A memory leak in the ip_options_get() function may lead to denial of service. Multiple overflows exist in the io_edgeport driver which might be usable as a denial of service attack vector. Bryan Fulton reported a bounds checking bug in the coda_pioctl function which may permit local users to execute arbitrary code or trigger a denial of service attack. Inproper initialization of the RTC may disclose information. Insufficient input sanitising in the load_elf_binary() function may lead to privilege escalation. Incorrect error handling in the binfmt_elf loader may lead to privilege escalation. A buffer overflow in the binfmt_elf loader may lead to privilege escalation or denial of service. The open_exec function may disclose information. The binfmt code is vulnerable to denial of service through malformed a.out binaries. A denial of service vulnerability in the ELF loader has been found. A programming error in the unix_dgram_recvmsg() function may lead to privilege escalation. The ELF loader is vulnerable to denial of service through malformed binaries. Crafted ELF binaries may lead to privilege escalation, due to insufficient checking of overlapping memory regions. A race condition in the load_elf_library() and binfmt_aout() functions may permit privilege escalation. An integer overflow in the Moxa driver may lead to privilege escalation. A remote denial of service vulnerability has been found in the PPP driver. An IA64 specific local denial of service vulnerability has been found in the [...] Solution : http://www.debian.org/security/2006/dsa-1069 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi |
||
Cables, Connectors |
Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x900Gb SAS, Proxmox
$340.00
Dell PowerEdge R620 Server 2x E5-2660 v1 2.2GHz 16 Cores 256GB RAM 2x 300GB HDD
$79.19
Dell PowerEdge R730XD 28 Core Server 2X Xeon E5-2680 V4 H730 128GB RAM No HDD
$389.99
Dell PowerEdge R720XD Xeon E5-2680 V2 2.8GHz 20 Cores 256GB RAM 12x4TB
$510.00
DELL POWEREDGE T430 SERVER W/ DUAL XEON E5-2609 CPU & 16GB MEMORY
$329.00
Dell PowerEdge R620 4-Bay Server 2x Xeon E5-2690 8 Core 2.9GHz 32GB No HDD H710P
$95.63
CTO Dell PowerEdge R630 Server, 2x Xeon E5-2620V4, 64GB- 512GB RAM, 480GB SSDs
$246.67
Dell PowerEdge R620 Server 2x E5-2650 V2 = 16 Cores H710P 128GB RAM 2x 600GB SAS
$274.99
DELL PowerEdge R730 Server 2x E5-2690v3 2.6GHz =24 Cores 32GB H730 4xRJ45
$274.00
PowerEdge R710 Rackmount Server 80GB RAM 2x XEON E5520 CPU 4.75TB
$200.00
|
||
No Discussions have been posted on this vulnerability. |