Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56232
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2006:0190
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0190.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

- - a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)

- - a race condition that allowed local users to read the environment
variables of another process (CVE-2004-1058, low)

- - a flaw in the open_exec function of execve that allowed a local user to
read setuid ELF binaries that should otherwise be protected by standard
permissions. (CVE-2004-1073, moderate). Red Hat originally reported this
flaw as being fixed by RHSA-2004:504, but a patch for this issue was
missing from that update.

- - a potential leak of kernel data from ext2 file system handling
(CVE-2005-0400, low)

- - flaws in ISO-9660 file system handling that allowed the mounting of
an invalid image on a CD-ROM to cause a denial of service (crash)
or potentially execute arbitrary code (CVE-2005-0815, moderate)

- - a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)

- - a flaw in exec() handling on some 64-bit architectures that allowed a
local user to cause a denial of service (crash) (CVE-2005-2708, important)

- - a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)

- - a flaw in IPv6 network UDP port hash table lookups that allowed a local
user to cause a denial of service (hang) (CVE-2005-2973, important)

- - a network buffer info leak using the orinoco driver that allowed a remote
user to possibly view uninitialized data (CVE-2005-3180, important)

- - a race condition affecting SMP systems that allowed a local user to cause
a denial of service (crash) (CVE-2005-3274, important)

- - a flaw in IPv4 network TCP and UDP netfilter handling that allowed a
local user to cause a denial of service (crash) (CVE-2005-3275, important)

- - a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)

The following bugs were also addressed:

- - Handle set_brk() errors in binfmt_elf

- - Correct scsi error return

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0190.html

Risk factor : High

CVSS Score:
6.6

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2002-2185
BugTraq ID: 5020
http://www.securityfocus.com/bid/5020
Bugtraq: 20020614 IGMP denial of service vulnerability (Google Search)
http://online.securityfocus.com/archive/1/276968
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.cs.ucsb.edu/~krishna/igmp_dos/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10736
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/18510
http://secunia.com/advisories/18562
http://secunia.com/advisories/18684
SGI Security Advisory: 20020901-01-A
ftp://patches.sgi.com/support/free/security/advisories/20020901-01-A
XForce ISS Database: igmp-spoofed-report-dos(9436)
https://exchange.xforce.ibmcloud.com/vulnerabilities/9436
Common Vulnerability Exposure (CVE) ID: CVE-2004-1058
BugTraq ID: 11052
http://www.securityfocus.com/bid/11052
BugTraq ID: 11937
http://www.securityfocus.com/bid/11937
Debian Security Information: DSA-1018 (Google Search)
http://www.debian.org/security/2006/dsa-1018
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427
http://www.redhat.com/support/errata/RHSA-2005-293.html
http://secunia.com/advisories/19038
http://secunia.com/advisories/19369
http://secunia.com/advisories/19607
http://secunia.com/advisories/21476
SGI Security Advisory: 20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
SuSE Security Announcement: SUSE-SA:2006:012 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
https://usn.ubuntu.com/38-1/
XForce ISS Database: linux-spawning-race-condition(17151)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17151
Common Vulnerability Exposure (CVE) ID: CVE-2004-1073
BugTraq ID: 11646
http://www.securityfocus.com/bid/11646
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.redhat.com/support/errata/RHSA-2004-505.html
http://www.redhat.com/support/errata/RHSA-2004-549.html
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
XForce ISS Database: linux-elf-setuid-gain-privileges(18025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
Common Vulnerability Exposure (CVE) ID: CVE-2005-0400
12932
http://www.securityfocus.com/bid/12932
14713
http://secunia.com/advisories/14713/
17002
http://secunia.com/advisories/17002
18684
20050401 Information leak in the Linux kernel ext2 implementation
http://marc.info/?l=bugtraq&m=111238764720696&w=2
ADV-2005-1878
http://www.vupen.com/english/advisories/2005/1878
FLSA:152532
RHSA-2005:366
http://www.redhat.com/support/errata/RHSA-2005-366.html
RHSA-2005:663
http://www.redhat.com/support/errata/RHSA-2005-663.html
RHSA-2006:0190
RHSA-2006:0191
USN-103-1
https://usn.ubuntu.com/103-1/
http://arkoon.net/advisories/ext2-make-empty-leak.txt
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.6
kernel-ext2-information-disclosure(19866)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19866
oval:org.mitre.oval:def:10336
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10336
Common Vulnerability Exposure (CVE) ID: CVE-2005-0815
BugTraq ID: 12837
http://www.securityfocus.com/bid/12837
Bugtraq: 20050317 Linux ISO9660 handling flaws (Google Search)
http://www.securityfocus.com/archive/1/393590
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9307
XForce ISS Database: kernel-iso9660-filesystem(19741)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19741
Common Vulnerability Exposure (CVE) ID: CVE-2005-2458
BugTraq ID: 14719
http://www.securityfocus.com/bid/14719
Debian Security Information: DSA-921 (Google Search)
http://www.debian.org/security/2005/dsa-921
Debian Security Information: DSA-922 (Google Search)
http://www.debian.org/security/2005/dsa-922
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10785
http://www.redhat.com/support/errata/RHSA-2006-0144.html
http://secunia.com/advisories/16355/
http://secunia.com/advisories/16500
http://secunia.com/advisories/17826
http://secunia.com/advisories/17918
http://secunia.com/advisories/18056
http://secunia.com/advisories/18059
http://secunia.com/advisories/19252
SuSE Security Announcement: SUSE-SA:2005:050 (Google Search)
http://www.novell.com/linux/security/advisories/2005_50_kernel.html
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
https://usn.ubuntu.com/169-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-2708
16320
http://www.securityfocus.com/bid/16320
18523
http://secunia.com/advisories/18523
18562
FLSA:157459-1
FLSA:157459-2
RHSA-2006:0140
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161925
oval:org.mitre.oval:def:10649
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10649
Common Vulnerability Exposure (CVE) ID: CVE-2005-2709
1015434
http://securitytracker.com/id?1015434
15365
http://www.securityfocus.com/bid/15365
17504
http://secunia.com/advisories/17504
17541
http://secunia.com/advisories/17541
17648
http://secunia.com/advisories/17648
18510
19369
19374
http://secunia.com/advisories/19374
20676
http://www.osvdb.org/20676
ADV-2005-2359
http://www.vupen.com/english/advisories/2005/2359
DSA-1017
http://www.debian.org/security/2006/dsa-1017
DSA-1018
FLSA:157459-3
FLSA:157459-4
MDKSA-2006:059
http://www.mandriva.com/security/advisories?name=MDKSA-2006:059
RHSA-2006:0101
USN-219-1
https://usn.ubuntu.com/219-1/
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14.1
kernel-sysctl-interface-dos(23040)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23040
oval:org.mitre.oval:def:10746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10746
Common Vulnerability Exposure (CVE) ID: CVE-2005-2973
15156
http://www.securityfocus.com/bid/15156
17261
http://secunia.com/advisories/17261
17280
http://secunia.com/advisories/17280
17917
http://secunia.com/advisories/17917
17918
19185
http://secunia.com/advisories/19185
20163
http://www.osvdb.org/20163
20237
http://secunia.com/advisories/20237
21745
http://secunia.com/advisories/21745
ADV-2005-2173
http://www.vupen.com/english/advisories/2005/2173
FEDORA-2005-1007
http://www.securityfocus.com/advisories/9549
FEDORA-2005-1013
http://www.securityfocus.com/advisories/9555
MDKSA-2006:040
http://www.mandriva.com/security/advisories?name=MDKSA-2006:040
MDKSA-2006:072
RHSA-2006:0493
http://www.redhat.com/support/errata/RHSA-2006-0493.html
SUSE-SA:2005:067
http://www.securityfocus.com/advisories/9806
SUSE-SA:2005:068
http://linux.bkbits.net:8080/linux-2.6/cset%404342df67SNhRx_3FGhUrrU-FXLlQIA
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170772
oval:org.mitre.oval:def:10041
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10041
Common Vulnerability Exposure (CVE) ID: CVE-2005-3180
BugTraq ID: 15085
http://www.securityfocus.com/bid/15085
Bugtraq: 20051012 Linux Orinoco drivers information leakage (Google Search)
http://marc.info/?l=bugtraq&m=112914754708402&w=2
Debian Security Information: DSA-1017 (Google Search)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11332
http://www.redhat.com/support/errata/RHSA-2005-808.html
http://secunia.com/advisories/17114
http://secunia.com/advisories/17364
http://securityreason.com/securityalert/75
SuSE Security Announcement: SUSE-SA:2005:067 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-3274
BugTraq ID: 15528
http://www.securityfocus.com/bid/15528
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
http://secunia.com/advisories/18977
Common Vulnerability Exposure (CVE) ID: CVE-2005-3275
BugTraq ID: 15531
http://www.securityfocus.com/bid/15531
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142
Common Vulnerability Exposure (CVE) ID: CVE-2005-3806
BugTraq ID: 15729
http://www.securityfocus.com/bid/15729
http://www.mandriva.com/security/advisories?name=MDKSA-2006:018
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9903
http://secunia.com/advisories/18203
https://usn.ubuntu.com/231-1/
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.