Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2003-046 (kernel).
The kernel package contains the Linux kernel (vmlinuz), the core of your
Red Hat Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.
Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux
kernel versions 2.4.23 and previous which may permit a local attacker to
gain root rights. No exploit is currently available
however, it is
believed that this issue is exploitable (although not trivially.) The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2003-0985 to this issue.
All users are advised to upgrade to these errata packages, which contain a
backported security patch that corrects this issue.
Red Hat would like to thank Paul Starzetz from ISEC for disclosing this
issue as well as Andrea Arcangeli and Solar Designer for working on the patch.
These packages also contain a fix for a minor information leak in the real
time clock (rtc) routines. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0984 to this issue.
* Wed Dec 24 2003 Dave Jones
- Fix mremap corner case.
* Tue Dec 23 2003 Dave Jones
- Numerous USB fixes (#110307, #90442, #107929, #110872)
* Tue Dec 16 2003 Dave Jones
- Fix leak in CDROM IOCTL. (#112249)
Solution : http://www.fedoranews.org/updates/FEDORA-2003-046.shtml
Network Security Threat Level: High
Networks Security ID: 9154
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|IBM SERVER 00WG700 1.2TB 10000RPM SAS 12GBPS 2.5INCH SWAP HARD DRIVE WITH TRAY
|2GB IBM 12R6446 PC2-4200R 533MHz 256M x 4 Reg 276-Pin DDR2 ECC Server Memory RAM
|IBM Server pSeries 00P2676 00P3068 36G 10K ST336607LC Hard Disk
|2.5" SATA SCSI Hard Drive Rack Installation Replacement f/ IBM x3650 Server E5Y9
No Discussions have been posted on this vulnerability.