Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory MDKSA-2004:029 (kernel).
A vulnerability was found in the R128 DRI driver by Alan Cox. This could permit
local privilege escalation. The previous fix, in MDKSA-2004:015 only partially
corrected the problem
the full fix is included (CVE-2004-0003).
A local root vulnerability was discovered in the isofs component of the Linux
kernel by iDefense. This vulnerability can be triggered by performing a
directory listing on a maliciously constructed ISO filesystem, or attempting to
access a file via a malformed symlink on such a filesystem (CVE-2004-0109).
An information leak was discovered in the ext3 filesystem code by Solar
Designer. It was discovered that when creating or writing to an ext3 filesystem,
some amount of other in-memory data gets written to the device. The data is not
the file's contents, not something on the same filesystem, or even anything that
was previously in a file at all. To obtain this data, a user needs to read the
raw device (CVE-2004-0177).
The same vulnerability was also found in the XFS filesystem code (CVE-2004-0133)
and the JFS filesystem code (CVE-2004-0181).
Finally, a vulnerability in the OSS code for SoundBlaster 16 devices was
discovered by Andreas Kies. It is possible for local users with access to the
sound system to crash the machine (CVE-2004-0178).
The provided packages are patched to fix these vulnerabilities. All users are
encouraged to upgrade to these updated kernels.
To update your kernel, please follow the directions located at:
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:029
Network Security Threat Level: High
Networks Security ID: 10152, 9570
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|CISCO NEW C3KX-NM-10G= Catalyst 3K-X 10G Network Module
|Cisco 891-k9 router
|New CISCO UCS-LIC-10GE= license for 1 Media Server on a physical server
|New CISCO N56-LAN1K9= license for 1 Media Server on a physical server
No Discussions have been posted on this vulnerability.