|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN30-1 : linux-source-2.6.8.1 vulnerabilities Vulnerability Assessment Details
|
USN30-1 : linux-source-2.6.8.1 vulnerabilities |
||
linux-source-2.6.8.1 vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - linux-doc-2.6.8.1 - linux-headers-2.6.8.1-3 - linux-headers-2.6.8.1-3-386 - linux-headers-2.6.8.1-3-686 - linux-headers-2.6.8.1-3-686-smp - linux-headers-2.6.8.1-3-amd64-generic - linux-headers-2.6.8.1-3-amd64-k8 - linux-headers-2.6.8.1-3-amd64-k8-smp - linux-headers-2.6.8.1-3-amd64-xeon - linux-headers-2.6.8.1-3-k7 - linux-headers-2.6.8.1-3-k7-smp - linux-headers-2.6.8.1-3-power3 - linux-headers-2.6.8.1-3-power3-smp - linux-headers-2.6.8. [...] Description : CVE-2004-0883, CVE-2004-0949: During an audit of the smb file system implementation within Linux, several vulnerabilities were discovered ranging from out of bounds read accesses to kernel level buffer overflows. To exploit any of these vulnerabilities, a possible hacker needs control over the answers of the connected Samba server. This could be achieved by man-in-the-middle attacks or by taking over the Samba server with e. g. the recently disclosed vulnerability in Samba 3.x (see CVE-2004-0882). While any of these vulnerabilities can be easily used as remote denial of service exploits against Linux systems, it is unclear if it is possible for a skilled local or remote attacker to use any of the possible buffer overflows for arbitrary code execution in kernel space. So these bugs may theoretically lead to privilege escalation and total compromise of the whole system. http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt: Several flaws have been found in the Linux ELF binar [...] Solution : Upgrade to : - linux-doc-2.6.8.1-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-386-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-686-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-686-smp-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-amd64-generic-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-amd64-k8-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-amd64-k8-smp-2.6.8.1-16.1 (Ubuntu 4.10) - linux-headers-2.6.8.1-3-a [...] Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
For Lenovo IdeaPad 3 15IIL05 15IML05 15ADA05 15ARE05 Palmrest Keyboard Touchpad
$59.25
NEW Palmrest Keyboard For Lenovo Thinkpad E15 Gen 2 20T8 20T9 Black 5M10W64513
$80.99
Genuine Lenovo IdeaPad 5-15IIL05 5-15ITL05 palmrest BL keyboard 5CB0Z31242
$118.90
Lenovo IP 5 16IAU7 16" 2.5K Chromebook i3-1215U 8GB Ram 128GB eMMC Chrome OS
$219.99
Lenovo Ideapad 1i 15.6" FHD Notebook Intel Core i5-1235U 8GB RAM 256GB SSD
$349.99
Lenovo ThinkPad Yoga 11e 11.6" 2in1 Touch Intel Core i3 4GB RAM 128GB SSD Win10
$59.00
Lenovo Legion Pro 5 16IRX8 16" i7-13700HX GEFORCE RTX 4070 32GB 1TB SSD W11H
$1169.99
Lenovo Thinkpad X1 Yoga G5 i5-10310U 1.7GHZ/16GB/512GB NVMe
$274.99
Lenovo Flex 7 14IRU8 14" 2.2K Touch Intel Core i7-1355U 16GB 1TB SSD W11H
$549.99
Lenovo K14 AMD Laptop, 14" FHD IPS LED , Ryzen 5 5600U, GB, 256GB SSD
$569.00
|
||
No Discussions have been posted on this vulnerability. |