Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2003-046 (kernel).
The kernel package contains the Linux kernel (vmlinuz), the core of your
Red Hat Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.
Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux
kernel versions 2.4.23 and previous which may permit a local attacker to
gain root rights. No exploit is currently available
however, it is
believed that this issue is exploitable (although not trivially.) The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2003-0985 to this issue.
All users are advised to upgrade to these errata packages, which contain a
backported security patch that corrects this issue.
Red Hat would like to thank Paul Starzetz from ISEC for disclosing this
issue as well as Andrea Arcangeli and Solar Designer for working on the patch.
These packages also contain a fix for a minor information leak in the real
time clock (rtc) routines. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0984 to this issue.
* Wed Dec 24 2003 Dave Jones
- Fix mremap corner case.
* Tue Dec 23 2003 Dave Jones
- Numerous USB fixes (#110307, #90442, #107929, #110872)
* Tue Dec 16 2003 Dave Jones
- Fix leak in CDROM IOCTL. (#112249)
Solution : http://www.fedoranews.org/updates/FEDORA-2003-046.shtml
Network Security Threat Level: High
Networks Security ID: 9154
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Microsoft Windows Server 2019 50 USER Remote Desktop Service RDS Cals
|Windows Server 2019 Datacenter Edition Retail License Key And Download Link
|Microsoft Windows Server 2019 Standard Activation - CLEARANCE STOCK
|WD WD SENTINEL DS5100 8 TB STORAGE PLUS SERVER - INTEL XEON DUAL-CORE (2 CORE) -
No Discussions have been posted on this vulnerability.