Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.840796 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu Update for linux-ec2 USN-1239-1 |
Summary: | Ubuntu Update for Linux kernel vulnerabilities USN-1239-1 |
Description: | Summary: Ubuntu Update for Linux kernel vulnerabilities USN-1239-1 Vulnerability Insight: Ryan Sweat discovered that the kernel incorrectly handled certain VLAN packets. On some systems, a remote attacker could send specially crafted traffic to crash the system, leading to a denial of service. (CVE-2011-1576) Vasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not correctly check the origin of mount points. A local attacker could exploit this to trick the system into unmounting arbitrary mount points, leading to a denial of service. (CVE-2011-1833) Vasiliy Kulikov discovered that taskstats did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2494) Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2495) Dan Rosenberg discovered that the Bluetooth stack incorrectly handled certain L2CAP requests. If a system was using Bluetooth, a remote attacker could send specially crafted traffic to crash the system or gain root privileges. (CVE-2011-2497) It was discovered that the EXT4 filesystem contained multiple off-by-one flaws. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2695) Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote attacker could exploit this to exhaust network resources, leading to a denial of service. (CVE-2011-2699) Christian Ohm discovered that the perf command looks for configuration files in the current directory. If a privileged user were tricked into running perf in a directory containing a malicious configuration file, an attacker could run arbitrary commands and possibly gain privileges. (CVE-2011-2905) Time Warns discovered that long symlinks were incorrectly handled on Be filesystems. A local attacker could exploit this with a malformed Be filesystem and crash the system, leading to a denial of service. (CVE-2011-2928) Dan Kaminsky discovered that the kernel incorrectly handled random sequence number generation. An attacker could use this flaw to possibly predict sequence numbers and inject packets. (CVE-2011-3188) Darren Lavender discovered that the CIFS client incorrectly handled certain large values. A remote attacker with a malicious server could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2011-3191) Affected Software/OS: linux-ec2 on Ubuntu 10.04 LTS Solution: Please Install the Updated Packages. CVSS Score: 8.3 CVSS Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1576 BugTraq ID: 48907 http://www.securityfocus.com/bid/48907 RedHat Security Advisories: RHSA-2011:0927 http://rhn.redhat.com/errata/RHSA-2011-0927.html http://www.redhat.com/support/errata/RHSA-2011-1090.html http://www.redhat.com/support/errata/RHSA-2011-1106.html http://www.securitytracker.com/id?1025853 Common Vulnerability Exposure (CVE) ID: CVE-2011-1833 SuSE Security Announcement: SUSE-SU-2011:0898 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html http://www.ubuntu.com/usn/USN-1188-1 Common Vulnerability Exposure (CVE) ID: CVE-2011-2494 http://www.openwall.com/lists/oss-security/2011/06/27/1 http://secunia.com/advisories/48898 SuSE Security Announcement: SUSE-SU-2012:0554 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html Common Vulnerability Exposure (CVE) ID: CVE-2011-2495 RedHat Security Advisories: RHSA-2011:1212 http://rhn.redhat.com/errata/RHSA-2011-1212.html Common Vulnerability Exposure (CVE) ID: CVE-2011-2497 BugTraq ID: 48472 http://www.securityfocus.com/bid/48472 http://marc.info/?l=linux-kernel&m=130891911909436&w=2 http://www.openwall.com/lists/oss-security/2011/06/24/9 http://www.openwall.com/lists/oss-security/2011/06/27/3 http://www.osvdb.org/74679 http://securityreason.com/securityalert/8359 Common Vulnerability Exposure (CVE) ID: CVE-2011-2695 http://www.spinics.net/lists/linux-ext4/msg25697.html http://www.openwall.com/lists/oss-security/2011/07/15/7 http://www.openwall.com/lists/oss-security/2011/07/15/8 http://secunia.com/advisories/45193 Common Vulnerability Exposure (CVE) ID: CVE-2011-2699 http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 http://www.openwall.com/lists/oss-security/2011/07/20/5 http://www.securitytracker.com/id?1027274 Common Vulnerability Exposure (CVE) ID: CVE-2011-2905 http://www.openwall.com/lists/oss-security/2011/08/09/6 Common Vulnerability Exposure (CVE) ID: CVE-2011-2928 BugTraq ID: 49256 http://www.securityfocus.com/bid/49256 Bugtraq: 20110819 [PRE-SA-2011-06] Linux kernel: ZERO_SIZE_PTR dereference for long symlinks in Be FS (Google Search) http://www.securityfocus.com/archive/1/519387/100/0/threaded http://www.pre-cert.de/advisories/PRE-SA-2011-06.txt http://www.openwall.com/lists/oss-security/2011/08/19/1 http://www.openwall.com/lists/oss-security/2011/08/19/5 http://securityreason.com/securityalert/8360 XForce ISS Database: linux-kernel-be-dos(69343) https://exchange.xforce.ibmcloud.com/vulnerabilities/69343 Common Vulnerability Exposure (CVE) ID: CVE-2011-3188 HPdes Security Advisory: HPSBGN02970 http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://www.openwall.com/lists/oss-security/2011/08/23/2 Common Vulnerability Exposure (CVE) ID: CVE-2011-3191 http://www.openwall.com/lists/oss-security/2011/08/24/2 |
Copyright | Copyright (C) 2011 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |