Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51013
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2003:317
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2003:317.

The iproute package contains advanced IP routing and network device
configuration tools.

Herbert Xu reported that iproute can accept spoofed messages sent on the
kernel netlink interface by other users on the local machine. This could
lead to a local denial of service attack. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2003-0856 to
this issue.

Users of iproute should upgrade to these erratum packages, which contain a
patch that checks that netlink messages actually came from the kernel.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2003-317.html

Risk factor : Medium

CVSS Score:
4.9

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0856
Debian Security Information: DSA-492 (Google Search)
http://www.debian.org/security/2004/dsa-492
http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00004.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10912
http://www.redhat.com/support/errata/RHSA-2003-316.html
http://www.redhat.com/support/errata/RHSA-2003-317.html
SuSE Security Announcement: SUSE-SR:2005:001 (Google Search)
http://www.novell.com/linux/security/advisories/2005_01_sr.html
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.