Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.53950
Categoría:Slackware Local Security Checks
Título:Slackware: Security Advisory (SSA:2004-006-01)
Resumen:The remote host is missing an update for the 'Kernel' package(s) announced via the SSA:2004-006-01 advisory.
Descripción:Summary:
The remote host is missing an update for the 'Kernel' package(s) announced via the SSA:2004-006-01 advisory.

Vulnerability Insight:
New kernels are available for Slackware 9.0, 9.1 and -current.
The 9.1 and -current kernels have been upgraded to 2.4.24, and a
fix has been backported to the 2.4.21 kernels in Slackware 9.0
to fix a bounds-checking problem in the kernel's mremap() call
which could be used by a local attacker to gain root privileges.
Sites should upgrade to the 2.4.24 kernel and kernel modules.
After installing the new kernel, be sure to run 'lilo'.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[link moved to references]


Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Tue Jan 6 15:01:54 PST 2004
patches/kernels/: Upgraded to Linux 2.4.24. This fixes a bounds-checking
problem in the kernel's mremap() call which could be used by a local attacker
to gain root privileges. Sites should upgrade to the 2.4.24 kernel and
kernel modules. After installing the new kernel, be sure to run 'lilo'.
For more details, see:
[link moved to references]
Thanks to Paul Starzetz for finding and researching this issue.
(* Security fix *)
patches/packages/alsa-driver-0.9.8-i486-2.tgz: Recompiled against
linux-2.4.24.
patches/packages/cvs-1.11.11-i486-1.tgz: Upgraded to cvs-1.11.11.
This version enforces greater security. Changes include pserver
refusing to run as root, and logging attempts to exploit the security
hole fixed in 1.11.10 in the syslog.
patches/packages/kernel-ide-2.4.24-i486-1.tgz: Upgraded bare.i kernel
package to Linux 2.4.24.
patches/packages/kernel-modules-2.4.24-i486-1.tgz: Upgraded to Linux
2.4.24 kernel modules.
patches/packages/kernel-source-2.4.24-noarch-2.tgz: Upgraded to Linux
2.4.24 kernel source, with XFS and Speakup patches included (but not
pre-applied). This uses the XFS and Speakup patches for 2.4.23, which
should be fine since 2.4.24 didn't change much code. Proper XFS
patches for 2.4.24 will probably be out soon to fix the one Makefile
rejection for EXTRAVERSION = -xfs, but likely little else will be
different since XFS development has already gone ahead to what is now
the 2.4.25-pre kernel series.
patches/packages/kernel-modules-xfs/alsa-driver-xfs-0.9.8-i486-2.tgz:
Recompiled against linux-2.4.24-xfs.
patches/packages/kernel-modules-xfs/kernel-modules-xfs-2.4.24-i486-1.tgz:
Upgraded to Linux 2.4.24 kernel modules for the xfs.s (XFS patched)
kernel.
+--------------------------+

Affected Software/OS:
'Kernel' package(s) on Slackware 9.0, Slackware 9.1, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2003-0985
BugTraq ID: 9356
http://www.securityfocus.com/bid/9356
Bugtraq: 20040105 Linux kernel do_mremap() proof-of-concept exploit code (Google Search)
http://marc.info/?l=bugtraq&m=107340358402129&w=2
Bugtraq: 20040105 Linux kernel mremap vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=107332782121916&w=2
Bugtraq: 20040106 Linux mremap bug correction (Google Search)
http://marc.info/?l=bugtraq&m=107340814409017&w=2
Bugtraq: 20040107 [slackware-security] Kernel security update (SSA:2004-006-01) (Google Search)
http://marc.info/?l=bugtraq&m=107350348418373&w=2
Bugtraq: 20040108 [slackware-security] Slackware 8.1 kernel security update (SSA:2004-008-01) (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2004-01/0070.html
Bugtraq: 20040112 SmoothWall Project Security Advisory SWP-2004:001 (Google Search)
http://marc.info/?l=bugtraq&m=107394143105081&w=2
CERT/CC vulnerability note: VU#490620
http://www.kb.cert.org/vuls/id/490620
Computer Incident Advisory Center Bulletin: O-045
http://www.ciac.org/ciac/bulletins/o-045.shtml
Conectiva Linux advisory: CLA-2004:799
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000799
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
Debian Security Information: DSA-413 (Google Search)
http://www.debian.org/security/2004/dsa-413
Debian Security Information: DSA-417 (Google Search)
http://www.debian.org/security/2004/dsa-417
Debian Security Information: DSA-423 (Google Search)
http://www.debian.org/security/2004/dsa-423
Debian Security Information: DSA-427 (Google Search)
http://www.debian.org/security/2004/dsa-427
Debian Security Information: DSA-439 (Google Search)
http://www.debian.org/security/2004/dsa-439
Debian Security Information: DSA-440 (Google Search)
http://www.debian.org/security/2004/dsa-440
Debian Security Information: DSA-442 (Google Search)
http://www.debian.org/security/2004/dsa-442
Debian Security Information: DSA-450 (Google Search)
http://www.debian.org/security/2004/dsa-450
Debian Security Information: DSA-470 (Google Search)
http://www.debian.org/security/2004/dsa-470
Debian Security Information: DSA-475 (Google Search)
http://www.debian.org/security/2004/dsa-475
En Garde Linux Advisory: ESA-20040105-001
http://www.linuxsecurity.com/advisories/engarde_advisory-3904.html
Immunix Linux Advisory: IMNX-2004-73-001-01
http://download.immunix.org/ImmunixOS/7.3/updates/IMNX-2004-73-001-01
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:001
http://isec.pl/vulnerabilities/isec-0013-mremap.txt
http://www.osvdb.org/3315
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A860
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A867
http://www.redhat.com/support/errata/RHSA-2003-416.html
http://www.redhat.com/support/errata/RHSA-2003-417.html
http://www.redhat.com/support/errata/RHSA-2003-418.html
http://www.redhat.com/support/errata/RHSA-2003-419.html
http://secunia.com/advisories/10532
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
SGI Security Advisory: 20040102-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040102-01-U
SuSE Security Announcement: SuSE-SA:2004:001 (Google Search)
SuSE Security Announcement: SuSE-SA:2004:003 (Google Search)
http://www.novell.com/linux/security/advisories/2004_03_linux_kernel.html
http://marc.info/?l=bugtraq&m=107332754521495&w=2
XForce ISS Database: linux-domremap-gain-privileges(14135)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14135
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.