Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.50881
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2001:071 (kernel)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to kernel
announced via advisory MDKSA-2001:071.

A security hole was found in the earlier Linux 2.4 kernels dealing with
iptables RELATED connection tracking. The iptables ip_conntrack_ftp
module, which is used for stateful inspection of FTP traffic,
does not validate parameters passed to it in an FTP PORT command. Due
to this flaw, carefully constructed PORT commands could open arbitrary
holes in the firewall. This hole has been fixed, as well as a number
of other bugs for the 2.4 kernel shipped with Mandrake Linux 8.0

NOTE: This update is *not* meant to be done via MandrakeUpdate! You
must download the necessary RPMs and upgrade manually by following
these steps:

1. Type: rpm -ivh kernel-2.4.7-12.3mdk.i586.rpm
2. Type: mv kernel-2.4.7-12.3mdk.i586.rpm /tmp
3. Type: rpm -Fvh *.rpm
4. You may wish to edit /etc/lilo.conf to ensure a new entry is in
place. The new kernel will be the last entry. Change any options
you need to change.
5. Type: /sbin/lilo -v

You may then reboot and use the nwe kernel and remove the older kernel
when you are comfortable using the upgraded one.

Affected versions: 8.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2001:071
http://www.tempest.com.br/advisories/01-2001.html
http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.