Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
"Solar Designer" discovered that arithmetic computations in netfilter's
do_replace() function can lead to a buffer overflow and the execution of
arbitrary code. However, the operation requires CAP_NET_ADMIN rights,
which is only an issue in virtualization systems or fine grained access
"Solar Designer" discovered a race condition in netfilter's
do_add_counters() function, which permits information disclosure of
kernel memory by exploiting a race condition. Like CVE-2006-0038,
it requires CAP_NET_ADMIN rights.
Intel EM64T systems were discovered to be susceptible to a local
DoS due to an endless recursive fault related to a bad ELF entry
Incorrectly declared die_if_kernel() function as "does never
return" which could be exploited by a local attacker resulting in
a kernel crash.
AMD64 machines (and other 7th and 8th generation AuthenticAMD
processors) were found to be vulnerable to sensitive information
leakage, due to how they handle saving and restoring the FOP, FIP,
and FDP x87 registers in FXSAVE/FXRSTOR when an exception is
pending. This permits a process to acertain portions of the state
of floating point instructions of other processes.
Marco Ivaldi discovered that there was an unintended information
disclosure permiting remote attackers to bypass protections against
Idle Scans (nmap -sI) by abusing the ID field of IP packets and
bypassing the zero IP ID in DF packet countermeasure. This was a
result of the ip_push_pending_frames function improperly
incremented the IP ID field when sending a RST after receiving
unsolicited TCP SYN-ACK packets.
Pavel Kankovsky reported the existence of a potential information leak
resulting from the failure to initialize sin.sin_zero in the IPv4 socket
Shaun Tancheff discovered a buffer overflow (boundary condition
error) in the USB Gadget RNDIS implementation permiting remote
attackers to cause a DoS. While creating a reply message, the
driver allocated memory for the reply data, but not for the reply
structure. The kernel fails to properly bounds-check user-supplied
data before copying it to an insufficiently sized memory
buffer. Attackers could crash the system, or possibly execute
arbitrary machine code.
Hugh Dickins discovered an issue in the madvise_remove() function wherein
file and mmap restrictions are not followed, permiting local users to
bypass IPC permissions and replace portions of readonly tmpfs files with
Alexandra Kossovsky reported a NULL pointer dereference condition in
ip_route_input() that can be triggered by a local user by requesting
a route for a multicast IP address, resulting in a denial of service
Solution : http://www.debian.org/security/2006/dsa-1097
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi
|IBM Netezza Database Accelerator Blade 00J1657 +Board 68Y8186 7870-AC1 2xQC 24GB
|IBM HS22 BLADECENTER SERVER TWO E5506 2.13GHZ 96GB 600GB 10K SAS
|IBM DX360 M3 SERVER TWO E5640 2.66GHZ 32GB 3 X 250GB SATA 2 X TESLA M1060 CONNEC
|IBM HS22 BLADECENTER SERVER TWO X5650 2.66GHZ 8GB 146GB 15K SAS
No Discussions have been posted on this vulnerability.