Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:040: kernel


Vulnerability Assessment Details

MDKSA-2006:040: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:040 (kernel).



A number of vulnerabilities were discovered and corrected in the Linux 2.6
kernel: The udp_v6_get_port function in udp.c, when running IPv6, permits local
users to cause a Denial of Service (infinite loop and crash) (CVE-2005-2973).
The mq_open system call in certain situations can decrement a counter twice as
a result of multiple calls to the mntput function when the dentry_open function
call fails, permiting a local user to cause a DoS (panic) via unspecified attack
vectors (CVE-2005-3356). The procfs code permits attackers to read sensitive
kernel memory via unspecified vectors in which a signed value is added to an
unsigned value (CVE-2005-4605). A buffer overflow in sysctl permits local users
to cause a DoS and possibly execute arbitrary code via a long string, which
causes sysctl to write a zero byte outside the buffer (CVE-2005-4618). A buffer
overflow in the CA-driver for TwinHan DST Frontend/Card permits local users to
cause a DoS (crash) and possibly execute arbitrary code by reading more than
eight bytes into an eight byte long array (CVE-2005-4639). dm-crypt does not
clear a structure before it is freed, which leads to a memory disclosure that
could permit local users to obtain sensitive information about a cryptographic
key (CVE-2006-0095). Remote attackers can cause a DoS via unknown attack
vectors related to an 'extra dst release when ip_options_echo fails' in icmp.c
(CVE-2006-0454). In addition to these security fixes, other fixes have been
included such as: - support for mptsas - fix for IPv6 with sis190 - a problem
with the time progressing twice as fast - a fix for Audigy 2 ZS Video Editor
sample rates - a fix for a supermount crash when accessing a supermount-ed CD/
DVD drive - a fix for improperly unloading sbp2 module The provided packages
are patched to fix these vulnerabilities. All users are encouraged to upgrade
to these updated kernels. To update your kernel, please follow the directions
located at: http://www.mandriva.com/en/security/kernelupdate



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:040
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

NEW SEALED CISCO GLC-T SFP TRANSCEIVER MODULE GBIC
$30.0
NEW SEALED CISCO GLC-T SFP TRANSCEIVER MODULE GBIC  pictureCisco WS-C1924-EN Catalyst 1900 Series 24-Port Enterprise Edition Network Switch
$19.95
Cisco WS-C1924-EN Catalyst 1900 Series 24-Port Enterprise Edition Network Switch pictureCisco System WS-C2950-24 Catalyst 2950 Series 254181
$12.0
Cisco System WS-C2950-24 Catalyst 2950 Series 254181 pictureCisco System WS-C2950-24 Catalyst 2950 Series 254180
$12.0
Cisco System WS-C2950-24 Catalyst 2950 Series 254180 picture


Discussions

No Discussions have been posted on this vulnerability.