|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2004:037: kernel Vulnerability Assessment Details
|
SUSE-SA:2004:037: kernel |
||
Check for the version of the kernel package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2004:037 (kernel). An integer underflow problem in the iptables firewall logging rules can permit a remote attacker to crash the machine by using a handcrafted IP packet. This attack is only possible with firewalling enabled. We would like to thank Richard Hart for reporting the problem. This problem has already been fixed in the 2.6.8 upstream Linux kernel, this update contains a backport of the fix. Products running a 2.4 kernel are not affected. Mitre has assigned the CVE ID CVE-2004-0816 for this problem. Additionaly Martin Schwidefsky of IBM found an incorrectly handled privileged instruction which can lead to a local user gaining root user rights. This only affects the SUSE Linux Enterprise Server 9 on the S/390 platform and has been assigned CVE ID CVE-2004-0887. Additionaly the following non-security bugs were fixed: - Two CD burning problems. - USB 2.0 stability problems under high load on SMP systems. - Several SUSE Linux Enterprise Server issues. (see the Maintenance Information Mail for more informations). Solution : http://www.suse.de/security/2004_37_kernel.html Network Security Threat Level: High Networks Security ID: 11488, 11489 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
Intel VROC Virtual Raid on CPU Upgrade Key (Standard) VROCSTANMOD
$123.86
Dell PowerEdge PERC H830 PCIe RAID Controller 12G 0NR5PC W/Battery Low Profile
$54.95
NEW LSI MegaRAID SAS 9285-8e Dell OEM PCI-E 6Gb/s LP RAID Controller w/1GB Cache
$35.00
Dell PERC H830 PCIe RAID Adapter 2GB Cache w/ Battery NR5PC 0NR5PC
$59.99
UCSC-RAID-M5 CISCO 12Gb/s SAS HBA Raid Controller w/ UCSC-SCAP-M5 Battery+Cable
$37.97
12 Gb/s SAS 3 RAID controller PCIe3 x8 w/ Cache 4GB module Cables & BBU
$30.00
Adaptec - ASR-7805 6Gbs SAS- PCI EXPRESS 3.0 X8 -1GB Cache RAID Controller Card
$24.99
ORICO 5 Bay Raid USB3.0 to SATA External Hard Drive Enclosure for 3.5'' HDD LOT
$219.99
Adaptec ASR-81605ZQ 12G SAS 16-Port 1GB Cache PCIe x8 RAID Controller W/Cables
$49.99
Supermicro AOC-S3108L-H8IR MegaRaid SAS 3108 12Gbps RAID Controller Low Profile
$29.99
|
||
No Discussions have been posted on this vulnerability. |