Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56733
Kategorie:Trustix Local Security Checks
Titel:Trustix Security Advisory TSLSA-2006-0026 (kernel)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory TSLSA-2006-0026.

kernel < TSL 3.0 >
- New Upstream.
- SECURITY Fix: An error in the Stream Control Transmission Protocol
(SCTP) code that uses incorrect state table entries when certain
ECNE chunks are received in CLOSED state, could be exploited by
attackers to cause a kernel panic via a specially crafted packet.
- An error exist when handling incoming IP-fragmented SCTP control
chunks, which could be exploited by attackers to cause a kernel
panic via a specially crafted packet.
- Linux SCTP (lksctp) allows remote attackers to cause a denial of
service (infinite recursion and crash) via a packet that contains
two or more DATA fragments, which causes an skb pointer to refer
back to itself when the full message is reassembled, leading to
infinite recursion in the sctp_skb_pull function
- Linux SCTP (lksctp) allows remote attackers to cause a denial of
service (deadlock) via a large number of small messages to a receiver
application that cannot process the messages quickly enough, which
leads to spillover of the receive buffer.
- A vulnerability has been identified due to an input
validation error when processing arguments containing backslash
(\\) characters passed to certain commands (e.g. cd),
which could be exploited by authenticated attackers to escape
chroot restrictions for a CIFS or SMBFS mounted filesystem.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2006-2271, CVE-2006-2272, CVE-2006-2274,
CVE-2006-2275 and CVE-2006-1864 to these issues.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0026

Risk factor : High

CVSS Score:
7.8

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-2271
BugTraq ID: 17910
http://www.securityfocus.com/bid/17910
Debian Security Information: DSA-1097 (Google Search)
http://www.debian.org/security/2006/dsa-1097
Debian Security Information: DSA-1103 (Google Search)
http://www.debian.org/security/2006/dsa-1103
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://labs.musecurity.com/advisories/MU-200605-01.txt
http://www.osvdb.org/25632
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10934
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://secunia.com/advisories/19990
http://secunia.com/advisories/20157
http://secunia.com/advisories/20237
http://secunia.com/advisories/20398
http://secunia.com/advisories/20671
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21476
http://secunia.com/advisories/21745
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.trustix.org/errata/2006/0026
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1734
http://www.vupen.com/english/advisories/2006/2554
XForce ISS Database: linux-sctp-ecne-chunk-dos(26430)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26430
Common Vulnerability Exposure (CVE) ID: CVE-2006-2272
http://www.osvdb.org/25633
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11243
XForce ISS Database: linux-sctp-control-chunk-dos(26431)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26431
Common Vulnerability Exposure (CVE) ID: CVE-2006-2274
BugTraq ID: 17955
http://www.securityfocus.com/bid/17955
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://www.osvdb.org/25746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531
http://secunia.com/advisories/21045
XForce ISS Database: linux-sctp-skb-pull-dos(26432)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432
Common Vulnerability Exposure (CVE) ID: CVE-2006-2275
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11295
http://www.redhat.com/support/errata/RHSA-2006-0575.html
http://secunia.com/advisories/21465
http://secunia.com/advisories/22417
XForce ISS Database: linux-sctp-receive-dos(26433)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26433
Common Vulnerability Exposure (CVE) ID: CVE-2006-1864
17735
http://www.securityfocus.com/bid/17735
19869
http://secunia.com/advisories/19869
2006-0026
20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
http://www.securityfocus.com/archive/1/451419/100/200/threaded
20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
http://www.securityfocus.com/archive/1/451404/100/0/threaded
20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451417/100/200/threaded
20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451426/100/200/threaded
20237
20398
20671
20716
20914
21035
http://secunia.com/advisories/21035
21476
21614
http://secunia.com/advisories/21614
21745
22497
http://secunia.com/advisories/22497
22875
http://secunia.com/advisories/22875
23064
http://secunia.com/advisories/23064
25067
http://www.osvdb.org/25067
ADV-2006-2554
ADV-2006-4502
http://www.vupen.com/english/advisories/2006/4502
DSA-1097
DSA-1103
MDKSA-2006:150
MDKSA-2006:151
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
RHSA-2006:0493
RHSA-2006:0579
http://www.redhat.com/support/errata/RHSA-2006-0579.html
RHSA-2006:0580
http://www.redhat.com/support/errata/RHSA-2006-0580.html
RHSA-2006:0710
http://www.redhat.com/support/errata/RHSA-2006-0710.html
SUSE-SA:2006:028
USN-302-1
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189435
kernel-smbfs-directory-traversal(26137)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26137
oval:org.mitre.oval:def:11327
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11327
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.