English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59198
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-509-1 (linux-source-2.6.17)
Summary:Ubuntu USN-509-1 (linux-source-2.6.17)
Description:
The remote host is missing an update to linux-source-2.6.17
announced via advisory USN-509-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Details follow:

A flaw in the sysfs_readdir function allowed a local user to cause a
denial of service by dereferencing a NULL pointer. (CVE-2007-3104)

A buffer overflow was discovered in the random number generator. In
environments with granular assignment of root privileges, a local attacker
could gain additional privileges. (CVE-2007-3105)

A flaw was discovered in the usblcd driver. A local attacker could cause
large amounts of kernel memory consumption, leading to a denial of service.
(CVE-2007-3513)

It was discovered that certain setuid-root processes did not correctly
reset process death signal handlers. A local user could manipulate this
to send signals to processes they would not normally have access to.
(CVE-2007-3848)

The Direct Rendering Manager for the i915 driver could be made to write
to arbitrary memory locations. An attacker with access to a running X11
session could send a specially crafted buffer and gain root privileges.
(CVE-2007-3851)

It was discovered that the aacraid SCSI driver did not correctly check
permissions on certain ioctls. A local attacker could cause a denial
of service or gain privileges. (CVE-2007-4308)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.10:
linux-image-2.6.17-12-386 2.6.17.1-12.40
linux-image-2.6.17-12-generic 2.6.17.1-12.40
linux-image-2.6.17-12-hppa32 2.6.17.1-12.40
linux-image-2.6.17-12-hppa64 2.6.17.1-12.40
linux-image-2.6.17-12-itanium 2.6.17.1-12.40
linux-image-2.6.17-12-mckinley 2.6.17.1-12.40
linux-image-2.6.17-12-powerpc 2.6.17.1-12.40
linux-image-2.6.17-12-powerpc-smp 2.6.17.1-12.40
linux-image-2.6.17-12-powerpc64-smp 2.6.17.1-12.40
linux-image-2.6.17-12-server 2.6.17.1-12.40
linux-image-2.6.17-12-server-bigiron 2.6.17.1-12.40
linux-image-2.6.17-12-sparc64 2.6.17.1-12.40
linux-image-2.6.17-12-sparc64-smp 2.6.17.1-12.40

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-509-1

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3104
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558
Debian Security Information: DSA-1428 (Google Search)
http://www.debian.org/security/2007/dsa-1428
RedHat Security Advisories: RHSA-2007:0488
http://rhn.redhat.com/errata/RHSA-2007-0488.html
http://www.redhat.com/support/errata/RHSA-2008-0089.html
SuSE Security Announcement: SUSE-SA:2007:064 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
http://www.ubuntu.com/usn/usn-510-1
http://www.ubuntu.com/usn/usn-508-1
http://www.ubuntu.com/usn/usn-509-1
BugTraq ID: 24631
http://www.securityfocus.com/bid/24631
http://osvdb.org/37115
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11233
http://www.securitytracker.com/id?1018289
http://secunia.com/advisories/25771
http://secunia.com/advisories/25838
http://secunia.com/advisories/26289
http://secunia.com/advisories/26643
http://secunia.com/advisories/26651
http://secunia.com/advisories/27912
http://secunia.com/advisories/28033
http://secunia.com/advisories/28643
Common Vulnerability Exposure (CVE) ID: CVE-2007-3105
Debian Security Information: DSA-1363 (Google Search)
http://www.debian.org/security/2007/dsa-1363
Debian Security Information: DSA-1504 (Google Search)
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
http://www.mandriva.com/security/advisories?name=MDKSA-2007:195
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
http://www.redhat.com/support/errata/RHSA-2007-0940.html
http://www.redhat.com/support/errata/RHSA-2007-0939.html
SuSE Security Announcement: SUSE-SA:2007:051 (Google Search)
http://www.novell.com/linux/security/advisories/2007_51_kernel.html
SuSE Security Announcement: SUSE-SA:2007:053 (Google Search)
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
BugTraq ID: 25348
http://www.securityfocus.com/bid/25348
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10371
http://secunia.com/advisories/26500
http://secunia.com/advisories/26647
http://secunia.com/advisories/27322
http://secunia.com/advisories/27436
http://secunia.com/advisories/26664
http://secunia.com/advisories/27212
http://secunia.com/advisories/27227
http://secunia.com/advisories/27747
http://secunia.com/advisories/29058
Common Vulnerability Exposure (CVE) ID: CVE-2007-3513
Debian Security Information: DSA-1356 (Google Search)
http://www.debian.org/security/2007/dsa-1356
http://www.ubuntu.com/usn/usn-489-1
BugTraq ID: 24734
http://www.securityfocus.com/bid/24734
http://osvdb.org/37116
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9883
http://www.vupen.com/english/advisories/2007/2403
http://secunia.com/advisories/25895
http://secunia.com/advisories/26139
http://secunia.com/advisories/26450
XForce ISS Database: kernel-lcdwrite-dos(35302)
http://xforce.iss.net/xforce/xfdb/35302
Common Vulnerability Exposure (CVE) ID: CVE-2007-3848
Bugtraq: 20070814 COSEINC Linux Advisory #1: Linux Kernel Parent Process DeathSignal Vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=118711306802632&w=2
Bugtraq: 20070814 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/476677/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/476803/100/0/threaded
Bugtraq: 20070814 COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/476464/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/476538/100/0/threaded
http://marc.info/?l=openwall-announce&m=118710356812637&w=2
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3848
Debian Security Information: DSA-1503 (Google Search)
http://www.debian.org/security/2008/dsa-1503
http://www.redhat.com/support/errata/RHSA-2007-1049.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
SuSE Security Announcement: SUSE-SA:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
SuSE Security Announcement: SUSE-SA:2008:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
BugTraq ID: 25387
http://www.securityfocus.com/bid/25387
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10120
http://secunia.com/advisories/27913
http://secunia.com/advisories/28806
http://secunia.com/advisories/29570
http://secunia.com/advisories/33280
Common Vulnerability Exposure (CVE) ID: CVE-2007-3851
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
http://www.redhat.com/support/errata/RHSA-2007-0705.html
BugTraq ID: 25263
http://www.securityfocus.com/bid/25263
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11196
http://www.vupen.com/english/advisories/2007/2854
http://secunia.com/advisories/26389
http://secunia.com/advisories/26760
Common Vulnerability Exposure (CVE) ID: CVE-2007-4308
Bugtraq: 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates (Google Search)
http://www.securityfocus.com/archive/1/archive/1/488457/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
BugTraq ID: 25216
http://www.securityfocus.com/bid/25216
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8872
http://www.vupen.com/english/advisories/2007/2786
http://www.vupen.com/english/advisories/2008/0637
http://securitytracker.com/id?1019470
http://secunia.com/advisories/26322
http://secunia.com/advisories/29032
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.