Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56230
Kategorie:Trustix Local Security Checks
Titel:Trustix Security Advisory TSLSA-2006-0004 (kernel, openssh)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory TSLSA-2006-0004.

kernel < TSL 3.0 >
- SECURITY Fix: Missing validation of the nlmsg_len value in
netlink_rcv_skb() can cause an infinite loop which can be exploited
by local users to cause a DoS by setting the value to 0.
- An error in the PPTP NAT helper in the handling of inbound
PPTP_IN_CALL_REQUEST packets can cause an error in offset calculation.
This can be exploited to cause random memory corruption and can crash
the kernel.
- ip_nat_pptp in the PPTP NAT helper (netfilter/ip_nat_helper_pptp.c) in
Linux kernel 2.6.14, and other versions, allows local users to cause a
denial of service via a crafted outbound packet that causes an incorrect
offset to be calculated from pointer arithmetic when non-linear SKBs
(socket buffers) are used.
- Stefan Rompf has reported a vulnerability caused due to the dm-crypt
driver failing to clear memory before freeing it. This can be exploited
by local users to obtain sensitive information.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2006-0035, CVE-2006-0036, CVE-2006-0037 and
CVE-2006-0095 to these issues.

openssh < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Josh Bressers has reported a weakness in OpenSSH
caused due to the insecure use of the system() function in
scp when performing copy operations using filenames that are
supplied by the user from the command line. This can be exploited
to execute shell commands with privileges of the user running scp.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2006-0225 to this issue.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0004

Risk factor : High

CVSS Score:
7.8

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-0035
BugTraq ID: 16414
http://www.securityfocus.com/bid/16414
http://secunia.com/advisories/18482
http://securityreason.com/securityalert/388
http://www.trustix.org/errata/2006/0004
http://www.vupen.com/english/advisories/2006/0220
XForce ISS Database: kernel-afnetlink-dos(24202)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24202
Common Vulnerability Exposure (CVE) ID: CVE-2006-0036
XForce ISS Database: kernel-pptpincallrequest-dos(24203)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24203
Common Vulnerability Exposure (CVE) ID: CVE-2006-0037
XForce ISS Database: kernel-pptpnathelper-dos(24204)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24204
Common Vulnerability Exposure (CVE) ID: CVE-2006-0095
BugTraq ID: 16301
http://www.securityfocus.com/bid/16301
Debian Security Information: DSA-1017 (Google Search)
http://www.debian.org/security/2006/dsa-1017
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:040
http://marc.info/?l=linux-kernel&m=113641114812886&w=2
http://marc.info/?l=linux-kernel&m=113640535312572&w=2
http://www.osvdb.org/22418
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11192
http://www.redhat.com/support/errata/RHSA-2006-0132.html
http://securitytracker.com/id?1015740
http://secunia.com/advisories/18487
http://secunia.com/advisories/18527
http://secunia.com/advisories/18774
http://secunia.com/advisories/19160
http://secunia.com/advisories/19374
http://secunia.com/advisories/20398
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
https://usn.ubuntu.com/244-1/
http://www.vupen.com/english/advisories/2006/0235
XForce ISS Database: kernel-dmcrypt-information-disclosure(24189)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24189
Common Vulnerability Exposure (CVE) ID: CVE-2006-0225
1015540
http://securitytracker.com/id?1015540
102961
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
16369
http://www.securityfocus.com/bid/16369
18579
http://secunia.com/advisories/18579
18595
http://secunia.com/advisories/18595
18650
http://secunia.com/advisories/18650
18736
http://secunia.com/advisories/18736
18798
http://secunia.com/advisories/18798
18850
http://secunia.com/advisories/18850
18910
http://secunia.com/advisories/18910
18964
http://secunia.com/advisories/18964
18969
http://secunia.com/advisories/18969
18970
http://secunia.com/advisories/18970
19159
http://secunia.com/advisories/19159
2006-0004
20060212 [3.8] 005: SECURITY FIX: February 12, 2006
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
20060703-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
20723
http://secunia.com/advisories/20723
21129
http://secunia.com/advisories/21129
21262
http://secunia.com/advisories/21262
21492
http://secunia.com/advisories/21492
21724
http://secunia.com/advisories/21724
22196
http://secunia.com/advisories/22196
22692
http://www.osvdb.org/22692
23241
http://secunia.com/advisories/23241
23340
http://secunia.com/advisories/23340
23680
http://secunia.com/advisories/23680
24479
http://secunia.com/advisories/24479
25607
http://secunia.com/advisories/25607
25936
http://secunia.com/advisories/25936
462
http://securityreason.com/securityalert/462
ADV-2006-0306
http://www.vupen.com/english/advisories/2006/0306
ADV-2006-2490
http://www.vupen.com/english/advisories/2006/2490
ADV-2006-4869
http://www.vupen.com/english/advisories/2006/4869
ADV-2007-0930
http://www.vupen.com/english/advisories/2007/0930
ADV-2007-2120
http://www.vupen.com/english/advisories/2007/2120
APPLE-SA-2007-03-13
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
FEDORA-2006-056
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
FLSA-2006:168935
http://www.securityfocus.com/archive/1/425397/100/0/threaded
GLSA-200602-11
http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
HPSBUX02178
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
MDKSA-2006:034
http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
OpenPKG-SA-2006.003
http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
RHSA-2006:0044
http://www.redhat.com/support/errata/RHSA-2006-0044.html
RHSA-2006:0298
http://www.redhat.com/support/errata/RHSA-2006-0298.html
RHSA-2006:0698
http://www.redhat.com/support/errata/RHSA-2006-0698.html
SSA:2006-045-06
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
SSRT061267
SUSE-SA:2006:008
http://www.novell.com/linux/security/advisories/2006_08_openssh.html
TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
USN-255-1
http://www.ubuntu.com/usn/usn-255-1
http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
http://docs.info.apple.com/article.html?artnum=305214
http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
openssh-scp-command-execution(24305)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
oval:org.mitre.oval:def:1138
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
oval:org.mitre.oval:def:9962
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.