![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.71530 |
Category: | FreeBSD Local Security Checks |
Title: | FreeBSD Ports: FreeBSD |
Summary: | The remote host is missing an update to the system; as announced in the referenced advisory. |
Description: | Summary: The remote host is missing an update to the system as announced in the referenced advisory. Vulnerability Insight: The following package is affected: FreeBSD CVE-2012-0217 The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products, Oracle Solaris 11 and earlier, illumos before r13724, Joyent SmartOS before 20120614T184600Z, FreeBSD before 9.0-RELEASE-p3, NetBSD 6.0 Beta and earlier, and Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: this description clearly does not belong in CVE, because a single entry cannot be about independent codebases. However, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. Solution: Update your system with the appropriate patches or software upgrades. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0217 Cert/CC Advisory: TA12-164A http://www.us-cert.gov/cas/techalerts/TA12-164A.html CERT/CC vulnerability note: VU#649219 http://www.kb.cert.org/vuls/id/649219 Debian Security Information: DSA-2501 (Google Search) http://www.debian.org/security/2012/dsa-2501 Debian Security Information: DSA-2508 (Google Search) http://www.debian.org/security/2012/dsa-2508 https://www.exploit-db.com/exploits/28718/ https://www.exploit-db.com/exploits/46508/ FreeBSD Security Advisory: FreeBSD-SA-12:04 http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc http://security.gentoo.org/glsa/glsa-201309-24.xml http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 http://lists.xen.org/archives/html/xen-announce/2012-06/msg00001.html http://lists.xen.org/archives/html/xen-devel/2012-06/msg01072.html Microsoft Security Bulletin: MS12-042 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-042 NETBSD Security Advisory: NetBSD-SA2012-003 http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2012-003.txt.asc https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15596 http://secunia.com/advisories/55082 |
Copyright | Copyright (C) 2012 E-Soft Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |