Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2002:043: traceroute-nanog/nkitb


Vulnerability Assessment Details

SUSE-SA:2002:043: traceroute-nanog/nkitb

Vulnerability Assessment Summary
Check for the version of the traceroute-nanog/nkitb package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2002:043 (traceroute-nanog/nkitb).


Traceroute is a tool that can be used to track packets in a TCP/IP
network to acertain it's route or to find out about not working
routers.
Traceroute-nanog requires root privilege to open a raw socket. It
does not relinquish these rights after doing so. This permits
a malicious user to gain root access by exploiting a buffer
overflow at a later point.

For all products prior to 8.1, the traceroute package
contains the NANOG implementation. This package is installed by
default. Starting with 8.1, SUSE LINUX contains a traceroute program
rewritten by Olaf Kirch that does not require root rights anymore.
This version of traceroute is not vulnerable.

This is the first update for the traceroute package on the SUSE LINUX
distributions 7.1 through 8.0. We have changed the version string in
the update packages to read '6.x' instead of the former 'nanog_6.x' to
enable a clean comparison between version numbers. This change is
misleading in that it suggests that the package name has been changed.
Since only the version string is affected, the name of the package
remains the same.

As a workaround you can remove the setuid bit or just permit trusted
users to execute traceroute-nanog.
Become root and add the following line to /etc/permissions.local:
'/usr/sbin/traceroute root.trusted 4750'
This line will keep the setuid root bit for /usr/sbin/traceroute
and just permit users in group trusted to execute the binary.
To make the permission change and keep it permanent you have to
run chkstat(8):
'chkstat -set /etc/permissions.local'

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
the update.

Solution : http://www.suse.de/security/2002_043_traceroute_nanog_nkitb.html
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

SAMSUNG M378B1G73EB0-YK0 8GB 2Rx8 DDR3 PC3L-12800U 1600MHz DIMM MEMORY/RAM
$42.61
SAMSUNG M378B1G73EB0-YK0 8GB 2Rx8 DDR3 PC3L-12800U 1600MHz DIMM MEMORY/RAM pictureHp Probook 6560B 15.6" 250GB HD 4GB Ram i5 Windows 7 Laptop
$85.0
Hp Probook 6560B 15.6ASUS ROG GL553VD-DS71 15.6" Gaming Laptop- i7-7700HQ, GTX1050, 1TB HD, 16GB RAM!
$22.13
ASUS ROG GL553VD-DS71 15.6ASUS ROG GL553VD-DS71 15.6" Gaming Laptop- i7-7700HQ, GTX1050, 1TB HD, 16GB RAM。
$22.13
ASUS ROG GL553VD-DS71 15.6


Discussions

No Discussions have been posted on this vulnerability.