![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.58558 |
Kategorie: | Red Hat Local Security Checks |
Titel: | RedHat Security Advisory RHSA-2007:0774 |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory RHSA-2007:0774. The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the security issues described below: * a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a denial of service or potential remote access. Exploitation would require the attacker to be able to send arbitrary frames over the ISDN network to the victim's machine. (CVE-2007-1217, Moderate) * a flaw in the perfmon subsystem on ia64 platforms that allowed a local user to cause a denial of service. (CVE-2006-0558, Moderate) In addition, the following bugs were addressed: * a panic after reloading of the LSI Fusion driver. * a vm performance problem was corrected by balancing inactive page lists. * added a nodirplus option to address NFSv3 performance issues with large directories. * changed the personality handling to disallow personality changes of setuid and setgid binaries. This ensures they keep any randomization and Exec-shield protection. All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2007-0774.html http://www.redhat.com/security/updates/classification/#moderate Risk factor : High CVSS Score: 6.9 |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-0558 BugTraq ID: 17482 http://www.securityfocus.com/bid/17482 Debian Security Information: DSA-1103 (Google Search) http://www.debian.org/security/2006/dsa-1103 http://marc.info/?l=linux-ia64&m=113882384921688 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10177 http://www.redhat.com/support/errata/RHSA-2007-0774.html http://secunia.com/advisories/19737 http://secunia.com/advisories/20914 http://secunia.com/advisories/26709 http://www.vupen.com/english/advisories/2006/1444 http://www.vupen.com/english/advisories/2006/2554 Common Vulnerability Exposure (CVE) ID: CVE-2007-1217 BugTraq ID: 23333 http://www.securityfocus.com/bid/23333 http://security.gentoo.org/glsa/glsa-200704-23.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:078 http://osvdb.org/34742 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10503 http://www.redhat.com/support/errata/RHSA-2007-0671.html http://www.redhat.com/support/errata/RHSA-2007-0672.html http://www.redhat.com/support/errata/RHSA-2007-0673.html http://www.redhat.com/support/errata/RHSA-2007-0705.html http://www.securitytracker.com/id?1018539 http://secunia.com/advisories/24777 http://secunia.com/advisories/26379 http://secunia.com/advisories/26478 http://secunia.com/advisories/26760 http://secunia.com/advisories/27528 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |