Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN30-1 : linux-source-2.6.8.1 vulnerabilities


Vulnerability Assessment Details

USN30-1 : linux-source-2.6.8.1 vulnerabilities

Vulnerability Assessment Summary
linux-source-2.6.8.1 vulnerabilities

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- linux-doc-2.6.8.1
- linux-headers-2.6.8.1-3
- linux-headers-2.6.8.1-3-386
- linux-headers-2.6.8.1-3-686
- linux-headers-2.6.8.1-3-686-smp
- linux-headers-2.6.8.1-3-amd64-generic
- linux-headers-2.6.8.1-3-amd64-k8
- linux-headers-2.6.8.1-3-amd64-k8-smp
- linux-headers-2.6.8.1-3-amd64-xeon
- linux-headers-2.6.8.1-3-k7
- linux-headers-2.6.8.1-3-k7-smp
- linux-headers-2.6.8.1-3-power3
- linux-headers-2.6.8.1-3-power3-smp
- linux-headers-2.6.8.
[...]

Description :

CVE-2004-0883, CVE-2004-0949:

During an audit of the smb file system implementation within Linux,
several vulnerabilities were discovered ranging from out of bounds
read accesses to kernel level buffer overflows.

To exploit any of these vulnerabilities, a possible hacker needs control
over the answers of the connected Samba server. This could be
achieved by man-in-the-middle attacks or by taking over the Samba
server with e. g. the recently disclosed vulnerability in Samba 3.x
(see CVE-2004-0882).

While any of these vulnerabilities can be easily used as remote denial
of service exploits against Linux systems, it is unclear if it is
possible for a skilled local or remote attacker to use any of the
possible buffer overflows for arbitrary code execution in kernel
space. So these bugs may theoretically lead to privilege escalation
and total compromise of the whole system.

http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt:

Several flaws have been found in the Linux ELF binar
[...]

Solution :

Upgrade to :
- linux-doc-2.6.8.1-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-386-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-686-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-686-smp-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-amd64-generic-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-amd64-k8-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-amd64-k8-smp-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-a
[...]


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

HP ProLiant ML110 G6 server Tower 2.4 GHZ 250 gb HD 6 GB memory Linux OS
$75.0
HP ProLiant ML110 G6 server Tower 2.4 GHZ  250 gb HD 6 GB memory Linux OS pictureHP ICE Insight Control License 1yr 24 x 7 Support 1 Server License C6N27A Gen8
$220.0
HP ICE Insight Control License 1yr 24 x 7 Support 1 Server License C6N27A Gen8 pictureNEW StarTech Parallel Print Server 10/100 MBPs PM1115P for PC Mac Linux
$42.95
NEW StarTech Parallel Print Server 10/100 MBPs PM1115P for PC Mac Linux pictureHP Z820 Workstation AutoDesk Gen3 2x E5-2687@3.10GHz 16GB RAM 250GB NVIDIA 6000
$1999.99
HP Z820 Workstation AutoDesk Gen3 2x E5-2687@3.10GHz 16GB RAM 250GB NVIDIA 6000 picture


Discussions

No Discussions have been posted on this vulnerability.