![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50948 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2003:198 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2003:198. The Linux kernel handles the basic functions of the operating system. Al Viro found a security issue in the tty layer in which any user could cause a kernel oops. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2002-0247 to this issue. A vulnerability in the kernel's TCP/IP fragment reassembly handling allows remote attackers to cause a denial of service (CPU consumption) via packets that cause a large number of hash table collisions. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0364 to this issue. Paul Starzetz discovered a file read race condition in the execve() system call, which could cause a local crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0462 to this issue. The /proc file system under Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program. This causes the program to fail to change the ownership and permissions of already-opened entries. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0501 to this issue. The STP protocol is known to have no security, which could allow attackers to alter the bridge topology. STP is now turned off by default. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0550 to this issue. The STP input processing is lax in its length checking, which could lead to a denial of service (DoS). The kernel contained in this erratum improves STP input processing. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0551 to this issue. Jerry Kreuscher discovered that the Forwarding table could be spoofed by sending forged packets with bogus source addresses that are the same as the local host. The Common Vulnerabilities and Exposures project cve.mitre.org) has assigned the name CVE-2003-0552 to this issue. An integer signedness error in the decode_fh function of nfs3xdr.c allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0619 to this issue. The C-Media PCI sound driver in unpatched kernel versions prior to 2.4.21 accesses userspace without using the get_user function, which is a potential security hole. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0699 to this issue. In addition, a number of bugfixes and updates have been applied to the IA32 emulation layer. All users should upgrade to these errata packages, which contain patches to the 2.4.18 kernel that address these issues. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2003-198.html Risk factor : Medium CVSS Score: 5.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0247 Debian Security Information: DSA-311 (Google Search) http://www.debian.org/security/2003/dsa-311 Debian Security Information: DSA-312 (Google Search) http://www.debian.org/security/2003/dsa-312 Debian Security Information: DSA-332 (Google Search) http://www.debian.org/security/2003/dsa-332 Debian Security Information: DSA-336 (Google Search) http://www.debian.org/security/2003/dsa-336 Debian Security Information: DSA-442 (Google Search) http://www.debian.org/security/2004/dsa-442 http://www.mandriva.com/security/advisories?name=MDKSA-2003:066 http://www.mandriva.com/security/advisories?name=MDKSA-2003:074 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A284 http://www.redhat.com/support/errata/RHSA-2003-187.html http://www.redhat.com/support/errata/RHSA-2003-195.html http://www.redhat.com/support/errata/RHSA-2003-198.html TurboLinux Advisory: TLSA-2003-41 http://www.turbolinux.com/security/TLSA-2003-41.txt Common Vulnerability Exposure (CVE) ID: CVE-2003-0364 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A295 Common Vulnerability Exposure (CVE) ID: CVE-2003-0462 Debian Security Information: DSA-358 (Google Search) http://www.debian.org/security/2004/dsa-358 Debian Security Information: DSA-423 (Google Search) http://www.debian.org/security/2004/dsa-423 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A309 http://www.redhat.com/support/errata/RHSA-2003-238.html http://www.redhat.com/support/errata/RHSA-2003-239.html Common Vulnerability Exposure (CVE) ID: CVE-2003-0501 Bugtraq: 20030620 Linux /proc sensitive information disclosure (Google Search) http://marc.info/?l=bugtraq&m=105621758104242 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A328 SuSE Security Announcement: SuSE-SA:2003:034 (Google Search) Common Vulnerability Exposure (CVE) ID: CVE-2003-0550 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A380 Common Vulnerability Exposure (CVE) ID: CVE-2003-0551 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A384 Common Vulnerability Exposure (CVE) ID: CVE-2003-0552 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A385 Common Vulnerability Exposure (CVE) ID: CVE-2003-0619 Bugtraq: 20030729 Remote Linux Kernel < 2.4.21 DoS in XDR routine. (Google Search) http://marc.info/?l=bugtraq&m=105950927708272&w=2 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A386 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |