Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory MDKSA-2004:029 (kernel).
A vulnerability was found in the R128 DRI driver by Alan Cox. This could permit
local privilege escalation. The previous fix, in MDKSA-2004:015 only partially
corrected the problem
the full fix is included (CVE-2004-0003).
A local root vulnerability was discovered in the isofs component of the Linux
kernel by iDefense. This vulnerability can be triggered by performing a
directory listing on a maliciously constructed ISO filesystem, or attempting to
access a file via a malformed symlink on such a filesystem (CVE-2004-0109).
An information leak was discovered in the ext3 filesystem code by Solar
Designer. It was discovered that when creating or writing to an ext3 filesystem,
some amount of other in-memory data gets written to the device. The data is not
the file's contents, not something on the same filesystem, or even anything that
was previously in a file at all. To obtain this data, a user needs to read the
raw device (CVE-2004-0177).
The same vulnerability was also found in the XFS filesystem code (CVE-2004-0133)
and the JFS filesystem code (CVE-2004-0181).
Finally, a vulnerability in the OSS code for SoundBlaster 16 devices was
discovered by Andreas Kies. It is possible for local users with access to the
sound system to crash the machine (CVE-2004-0178).
The provided packages are patched to fix these vulnerabilities. All users are
encouraged to upgrade to these updated kernels.
To update your kernel, please follow the directions located at:
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:029
Network Security Threat Level: High
Networks Security ID: 10152, 9570
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|JC628A HP A10500 16-port 10GbE SFP SC Module
|StarTech I/O Cards PEX10GSFP4I QuadPort SFP+ Server Network Card PCI Express
|JE068A HP A5120-24G EI Switch 24P RJ-45 Auto 10 100 1000 ports Base-T or SFP
|JD374A HP Procure A5500 24G SFP EI 24 Port Gigabit Managed L3 Switch
No Discussions have been posted on this vulnerability.