|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2002:043: traceroute-nanog/nkitb Vulnerability Assessment Details
|
SUSE-SA:2002:043: traceroute-nanog/nkitb |
||
Check for the version of the traceroute-nanog/nkitb package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2002:043 (traceroute-nanog/nkitb). Traceroute is a tool that can be used to track packets in a TCP/IP network to acertain it's route or to find out about not working routers. Traceroute-nanog requires root privilege to open a raw socket. It does not relinquish these rights after doing so. This permits a malicious user to gain root access by exploiting a buffer overflow at a later point. For all products prior to 8.1, the traceroute package contains the NANOG implementation. This package is installed by default. Starting with 8.1, SUSE LINUX contains a traceroute program rewritten by Olaf Kirch that does not require root rights anymore. This version of traceroute is not vulnerable. This is the first update for the traceroute package on the SUSE LINUX distributions 7.1 through 8.0. We have changed the version string in the update packages to read '6.x' instead of the former 'nanog_6.x' to enable a clean comparison between version numbers. This change is misleading in that it suggests that the package name has been changed. Since only the version string is affected, the name of the package remains the same. As a workaround you can remove the setuid bit or just permit trusted users to execute traceroute-nanog. Become root and add the following line to /etc/permissions.local: '/usr/sbin/traceroute root.trusted 4750' This line will keep the setuid root bit for /usr/sbin/traceroute and just permit users in group trusted to execute the binary. To make the permission change and keep it permanent you have to run chkstat(8): 'chkstat -set /etc/permissions.local' Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update. Solution : http://www.suse.de/security/2002_043_traceroute_nanog_nkitb.html Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
Cisco SG110 24 Port Gigabit Ethernet Switch w/ 2 x SFP SG110-24
$117.00
GENUINE CISCO DS-SFP-FC32G-SW SFP NEW SEALED SEE PHOTOS SHIPS FREE
$74.99
GENUINE CISCO 25G Base Active Optical SFP cable 3M SFP-25G-AOC3M NEW SHIPS FREE
$65.99
Cisco SG350XG-48T 48 Port Layer 3 10G Gigabit Ethernet Switch SG350XG-48T-K9-NA
$1800.00
Genuine Cisco SFP-10G-SR V03 10GBASE-SR SFP+ Transceiver Module 10-2415-03
$8.00
For Cisco SFP-10G-T, Ubiquiti UF-RJ45-10G Module 10G SFP+ to RJ45 10GBase-T
$49.59
FS SFP-10G-T, 10GBASE-T SFP+ Copper RJ-45 30m Transceiver Module
$50.00
GENUINE Cisco SFP-GE-T EXT 30-1421-01 USA 1000BASE-T RJ45 SFP Transceiver
$9.99
NEW Sealed Cisco SFP-10G-SR-S 10G SR SFP+ Module 850nmMM *US Shipping*
$15.00
LOT OF 20 Genuine Cisco SFP-10G-SR V03 10GBASE-SR SFP+ Transceiver Module
$89.00
|
||
No Discussions have been posted on this vulnerability. |