Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.64333
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:1132
Resumen:The remote host is missing updates to the Linux kernel announced in;advisory RHSA-2009:1132.;;These updated packages fix the following security issues:;; * a flaw was found in the Intel PRO/1000 network driver in the Linux;kernel. Frames with sizes near the MTU of an interface may be split across;multiple hardware receive descriptors. Receipt of such a frame could leak;through a validation check, leading to a corruption of the length check. A;remote attacker could use this flaw to send a specially-crafted packet that;would cause a denial of service. (CVE-2009-1385, Important);; * the Linux kernel Network File System daemon (nfsd) implementation did not;drop the CAP_MKNOD capability when handling requests from local,;unprivileged users. This flaw could possibly lead to an information leak or;privilege escalation. (CVE-2009-1072, Moderate);; * Frank Filz reported the NFSv4 client was missing a file permission check;for the execute bit in some situations. This could allow local,;unprivileged users to run non-executable files on NFSv4 mounted file;systems. (CVE-2009-1630, Moderate);; * a missing check was found in the hypervisor_callback() function in the;Linux kernel provided by the kernel-xen package. This could cause a denial;of service of a 32-bit guest if an application running in that guest;accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate);; * a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and;agp_generic_alloc_pages() functions did not zero out the memory pages they;allocate, which may later be available to user-space processes. This flaw;could possibly lead to an information leak. (CVE-2009-1192, Low)
Descripción:Summary:
The remote host is missing updates to the Linux kernel announced in
advisory RHSA-2009:1132.

These updated packages fix the following security issues:

* a flaw was found in the Intel PRO/1000 network driver in the Linux
kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service. (CVE-2009-1385, Important)

* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)

* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)

* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)

* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-1072
BugTraq ID: 34205
http://www.securityfocus.com/bid/34205
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1800 (Google Search)
http://www.debian.org/security/2009/dsa-1800
http://thread.gmane.org/gmane.linux.kernel/805280
http://www.openwall.com/lists/oss-security/2009/03/23/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10314
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8382
http://www.redhat.com/support/errata/RHSA-2009-1081.html
http://secunia.com/advisories/34422
http://secunia.com/advisories/34432
http://secunia.com/advisories/34786
http://secunia.com/advisories/35121
http://secunia.com/advisories/35185
http://secunia.com/advisories/35343
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/35656
http://secunia.com/advisories/37471
SuSE Security Announcement: SUSE-SA:2009:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
SuSE Security Announcement: SUSE-SA:2009:028 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://www.ubuntu.com/usn/usn-793-1
http://www.vupen.com/english/advisories/2009/0802
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: linux-kernel-capmknod-security-bypass(49356)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49356
Common Vulnerability Exposure (CVE) ID: CVE-2009-1192
20090516 rPSA-2009-0084-1 kernel
http://www.securityfocus.com/archive/1/503610/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
34673
http://www.securityfocus.com/bid/34673
34981
http://secunia.com/advisories/34981
35011
http://secunia.com/advisories/35011
35120
http://secunia.com/advisories/35120
35121
35343
35387
http://secunia.com/advisories/35387
35656
37351
http://secunia.com/advisories/37351
37471
ADV-2009-3316
DSA-1787
http://www.debian.org/security/2009/dsa-1787
DSA-1794
http://www.debian.org/security/2009/dsa-1794
DSA-1800
MDVSA-2009:119
http://www.mandriva.com/security/advisories?name=MDVSA-2009:119
MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
RHSA-2009:1081
SUSE-SA:2009:032
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html
SUSE-SA:2009:054
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html
SUSE-SA:2009:056
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html
USN-793-1
[oss-security] 20090422 CVE-2009-1192 kernel: agp: zero pages before sending to userspace
http://openwall.com/lists/oss-security/2009/04/22/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=59de2bebabc5027f93df999d59cc65df591c3e6e
http://wiki.rpath.com/Advisories:rPSA-2009-0084
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc3
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://bugzilla.redhat.com/show_bug.cgi?id=497020
oval:org.mitre.oval:def:10567
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10567
oval:org.mitre.oval:def:8003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8003
Common Vulnerability Exposure (CVE) ID: CVE-2009-1385
20090724 rPSA-2009-0111-1 kernel
http://www.securityfocus.com/archive/1/505254/100/0/threaded
20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
http://www.securityfocus.com/archive/1/512019/100/0/threaded
35185
http://www.securityfocus.com/bid/35185
35265
http://secunia.com/advisories/35265
35566
http://secunia.com/advisories/35566
35623
http://secunia.com/advisories/35623
35847
http://secunia.com/advisories/35847
36051
http://secunia.com/advisories/36051
36131
http://secunia.com/advisories/36131
36327
http://secunia.com/advisories/36327
54892
http://osvdb.org/54892
DSA-1844
http://www.debian.org/security/2009/dsa-1844
DSA-1865
http://www.debian.org/security/2009/dsa-1865
FEDORA-2009-6768
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
FEDORA-2009-6846
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
FEDORA-2009-6883
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
MDVSA-2009:148
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
RHSA-2009:1157
http://www.redhat.com/support/errata/RHSA-2009-1157.html
RHSA-2009:1193
http://www.redhat.com/support/errata/RHSA-2009-1193.html
RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
SUSE-SA:2009:038
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
http://www.openwall.com/lists/oss-security/2009/06/03/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10
http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302
http://wiki.rpath.com/Advisories:rPSA-2009-0111
http://www.intel.com/support/network/sb/CS-030543.htm
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8
https://bugzilla.redhat.com/show_bug.cgi?id=502981
oval:org.mitre.oval:def:11598
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
oval:org.mitre.oval:def:11681
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
oval:org.mitre.oval:def:8340
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
Common Vulnerability Exposure (CVE) ID: CVE-2009-1630
BugTraq ID: 34934
http://www.securityfocus.com/bid/34934
Bugtraq: 20090724 rPSA-2009-0111-1 kernel (Google Search)
Debian Security Information: DSA-1809 (Google Search)
http://www.debian.org/security/2009/dsa-1809
Debian Security Information: DSA-1844 (Google Search)
Debian Security Information: DSA-1865 (Google Search)
http://article.gmane.org/gmane.linux.nfs/26592
http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html
http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html
http://www.openwall.com/lists/oss-security/2009/05/13/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990
http://secunia.com/advisories/35106
http://secunia.com/advisories/35298
SuSE Security Announcement: SUSE-SA:2009:038 (Google Search)
http://www.vupen.com/english/advisories/2009/1331
Common Vulnerability Exposure (CVE) ID: CVE-2009-1758
BugTraq ID: 34957
http://www.securityfocus.com/bid/34957
http://lists.xensource.com/archives/html/xen-devel/2009-05/msg00561.html
http://www.openwall.com/lists/oss-security/2009/05/14/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10313
http://secunia.com/advisories/35093
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.