Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58893
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2007:0169
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0169.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

* a flaw in the IPv6 socket option handling that allowed a local user to
read arbitrary kernel memory (CVE-2007-1000, Important).

* a flaw in the IPv6 socket option handling that allowed a local user to
cause a denial of service (CVE-2007-1388, Important).

* a flaw in the utrace support that allowed a local user to cause a denial
of service (CVE-2007-0771, Important).

In addition to the security issues described above, a fix for a memory leak
in the audit subsystem and a fix for a data corruption bug on s390 systems
have been included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum
packages, which are not vulnerable to these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0169.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
7.2

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0771
BugTraq ID: 23720
http://www.securityfocus.com/bid/23720
http://osvdb.org/35927
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9447
http://www.redhat.com/support/errata/RHSA-2007-0169.html
http://securitytracker.com/id?1017979
http://secunia.com/advisories/25080
XForce ISS Database: kernel-utracesupport-dos(34128)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34128
Common Vulnerability Exposure (CVE) ID: CVE-2007-1000
20070615 rPSA-2007-0124-1 kernel xen
http://www.securityfocus.com/archive/1/471457
22904
http://www.securityfocus.com/bid/22904
24493
http://secunia.com/advisories/24493
24518
http://secunia.com/advisories/24518
24777
http://secunia.com/advisories/24777
24901
http://secunia.com/advisories/24901
25080
25099
http://secunia.com/advisories/25099
25691
http://secunia.com/advisories/25691
26133
http://secunia.com/advisories/26133
26139
http://secunia.com/advisories/26139
33025
http://www.osvdb.org/33025
ADV-2007-0907
http://www.vupen.com/english/advisories/2007/0907
FEDORA-2007-335
http://fedoranews.org/cms/node/2787
FEDORA-2007-336
http://fedoranews.org/cms/node/2788
MDKSA-2007:078
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078
RHSA-2007:0169
SUSE-SA:2007:029
http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
USN-486-1
http://www.ubuntu.com/usn/usn-486-1
USN-489-1
http://www.ubuntu.com/usn/usn-489-1
VU#920689
http://www.kb.cert.org/vuls/id/920689
http://bugzilla.kernel.org/show_bug.cgi?id=8134
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.2
http://www.wslabi.com/wabisabilabi/initPublishedBid.do?
https://issues.rpath.com/browse/RPL-1153
oval:org.mitre.oval:def:10015
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10015
Common Vulnerability Exposure (CVE) ID: CVE-2007-1388
BugTraq ID: 23142
http://www.securityfocus.com/bid/23142
http://bugzilla.kernel.org/show_bug.cgi?id=8155
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11509
http://secunia.com/advisories/25392
SuSE Security Announcement: SUSE-SA:2007:029 (Google Search)
http://www.ubuntu.com/usn/usn-464-1
http://www.vupen.com/english/advisories/2007/1122
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.