Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:235: kernel


Vulnerability Assessment Details

MDKSA-2005:235: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:235 (kernel).



Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and
corrected in this update: A stack-based buffer overflow in the sendmsg function
call in versions prior to 2.6.13.1 permit local users to execute arbitrary code
by calling sendmsg and modifying the message contents in another thread
(CVE-2005-2490). The raw_sendmsg function in versions prior to 2.6.13.1 permit
local users to cause a DoS (change hardware state) or read from arbitrary
memory via crafted input (CVE-2005-2492). The ipt_recent module in versions
prior to 2.6.12 does not properly perform certain tests when the jiffies value
is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block
too early (CVE-2005-2873). Multiple vulnerabilities in versions prior to
2.6.13.2 permit local users to cause a DoS (oops from null dereference) via fput
in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit
routing_ioctl function on 64-bit systems (CVE-2005-3044). Versions 2.6.8 to
2.6.14-rc2 permit local users to cause a DoS (oops) via a userspace process that
issues a USB Request Block (URB) to a USB device and terminates before the URB
is finished, which leads to a stale pointer reference (CVE-2005-3055). drm.c in
version 2.6.13 and earlier creates a debug file in sysfs with world-readable
and world-writable permissions, permiting local users to enable DRM debugging
and obtain sensitive information (CVE-2005-3179). The Orinoco driver in 2.6.13
and earlier does not properly clear memory from a previously used packet whose
length is increased, permiting remote attackers to obtain sensitive information
(CVE-2005-3180). Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is
enabled, use an incorrect function to free names_cache memory, preventing the
memory from being tracked by AUDITSYSCALL code and leading to a memory leak
(CVE-2005-3181). The VT implementation in version 2.6.12 permits local users to
use certain IOCTLs on terminals of other users and gain rights
(CVE-2005-3257). A race condition in ip_vs_conn_flush in versions prior to
2.6.13, when running on SMP systems, permits local users to cause a DoS (null
dereference) by causing a connection timer to expire while the connection table
is being flushed before the appropriate lock is acquired (CVE-2005-3274). The
provided packages are patched to fix these vulnerabilities. All users are
encouraged to upgrade to these updated kernels. To update your kernel, please
follow the directions located at: http://www.mandriva.com/en/security/
kernelupdate



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:235
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


Cisco SG110 8 Port Gigabit Ethernet Switch SG110D-08-UK picture

Cisco SG110 8 Port Gigabit Ethernet Switch SG110D-08-UK

$39.00



Cisco SG110-16HP 16-Port Gigabit PoE Unmanaged Switch SG110-16HP-NA picture

Cisco SG110-16HP 16-Port Gigabit PoE Unmanaged Switch SG110-16HP-NA

$108.00



8 Ports Unmanaged Industrial Ethernet Switch Network Gigabit Ethernet Switch picture

8 Ports Unmanaged Industrial Ethernet Switch Network Gigabit Ethernet Switch

$76.50



HP Procurve 2824 24 Gigabit Ports 10/100/1000 External Managed Switch J4903A picture

HP Procurve 2824 24 Gigabit Ports 10/100/1000 External Managed Switch J4903A

$74.99



HP 2530-48G 48 Port Gigabit Ethernet Network Switch J9775A picture

HP 2530-48G 48 Port Gigabit Ethernet Network Switch J9775A

$30.95



New Linksys SE3005 5-port Gigabit Ethernet Switch picture

New Linksys SE3005 5-port Gigabit Ethernet Switch

$18.99



New 10/100 Mbps 8 Ports Fast Ethernet LAN Desktop RJ45 Network Switch Hub picture

New 10/100 Mbps 8 Ports Fast Ethernet LAN Desktop RJ45 Network Switch Hub

$11.49



HP ProCurve 2530-24G J9776A 24 Port Gigabit Ethernet Managed Network Switch picture

HP ProCurve 2530-24G J9776A 24 Port Gigabit Ethernet Managed Network Switch

$34.99



Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord picture

Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord

$43.95



HP Aruba 2530-8G-PoE+ 8x PoE+ RJ45 2x SFP Gigabit Switch J9774A No AC Adapter picture

HP Aruba 2530-8G-PoE+ 8x PoE+ RJ45 2x SFP Gigabit Switch J9774A No AC Adapter

$37.99



Discussions

No Discussions have been posted on this vulnerability.