Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50948
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2003:198
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2003:198.

The Linux kernel handles the basic functions of the operating system.

Al Viro found a security issue in the tty layer in which any user could
cause a kernel oops. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2002-0247 to this issue.

A vulnerability in the kernel's TCP/IP fragment reassembly handling allows
remote attackers to cause a denial of service (CPU consumption) via packets
that cause a large number of hash table collisions. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2003-0364 to this issue.

Paul Starzetz discovered a file read race condition in the execve() system
call, which could cause a local crash. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2003-0462 to
this issue.

The /proc file system under Linux allows local users to obtain sensitive
information by opening various entries in /proc/self before executing a
setuid program. This causes the program to fail to change the ownership and
permissions of already-opened entries. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2003-0501 to
this issue.

The STP protocol is known to have no security, which could allow attackers
to alter the bridge topology. STP is now turned off by default. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2003-0550 to this issue.

The STP input processing is lax in its length checking, which could lead to
a denial of service (DoS). The kernel contained in this erratum improves
STP input processing. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0551 to this issue.

Jerry Kreuscher discovered that the Forwarding table could be spoofed by
sending forged packets with bogus source addresses that are the same as the
local host. The Common Vulnerabilities and Exposures project cve.mitre.org)
has assigned the name CVE-2003-0552 to this issue.

An integer signedness error in the decode_fh function of nfs3xdr.c allows
remote attackers to cause a denial of service (kernel panic) via a negative
size value within XDR data of an NFSv3 procedure call. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2003-0619 to this issue.

The C-Media PCI sound driver in unpatched kernel versions prior to 2.4.21
accesses userspace without using the get_user function, which is a
potential security hole. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0699 to this issue.

In addition, a number of bugfixes and updates have been applied to the IA32
emulation layer.

All users should upgrade to these errata packages, which contain patches to
the 2.4.18 kernel that address these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2003-198.html

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0247
Debian Security Information: DSA-311 (Google Search)
http://www.debian.org/security/2003/dsa-311
Debian Security Information: DSA-312 (Google Search)
http://www.debian.org/security/2003/dsa-312
Debian Security Information: DSA-332 (Google Search)
http://www.debian.org/security/2003/dsa-332
Debian Security Information: DSA-336 (Google Search)
http://www.debian.org/security/2003/dsa-336
Debian Security Information: DSA-442 (Google Search)
http://www.debian.org/security/2004/dsa-442
http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A284
http://www.redhat.com/support/errata/RHSA-2003-187.html
http://www.redhat.com/support/errata/RHSA-2003-195.html
http://www.redhat.com/support/errata/RHSA-2003-198.html
TurboLinux Advisory: TLSA-2003-41
http://www.turbolinux.com/security/TLSA-2003-41.txt
Common Vulnerability Exposure (CVE) ID: CVE-2003-0364
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A295
Common Vulnerability Exposure (CVE) ID: CVE-2003-0462
Debian Security Information: DSA-358 (Google Search)
http://www.debian.org/security/2004/dsa-358
Debian Security Information: DSA-423 (Google Search)
http://www.debian.org/security/2004/dsa-423
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A309
http://www.redhat.com/support/errata/RHSA-2003-238.html
http://www.redhat.com/support/errata/RHSA-2003-239.html
Common Vulnerability Exposure (CVE) ID: CVE-2003-0501
Bugtraq: 20030620 Linux /proc sensitive information disclosure (Google Search)
http://marc.info/?l=bugtraq&m=105621758104242
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A328
SuSE Security Announcement: SuSE-SA:2003:034 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2003-0550
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A380
Common Vulnerability Exposure (CVE) ID: CVE-2003-0551
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A384
Common Vulnerability Exposure (CVE) ID: CVE-2003-0552
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A385
Common Vulnerability Exposure (CVE) ID: CVE-2003-0619
Bugtraq: 20030729 Remote Linux Kernel < 2.4.21 DoS in XDR routine. (Google Search)
http://marc.info/?l=bugtraq&m=105950927708272&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A386
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.