Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2004.30.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-30-1)
Summary:The remote host is missing an update for the 'linux-source-2.6.8.1' package(s) announced via the USN-30-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-source-2.6.8.1' package(s) announced via the USN-30-1 advisory.

Vulnerability Insight:
CAN-2004-0883, CAN-2004-0949:

During an audit of the smb file system implementation within Linux,
several vulnerabilities were discovered ranging from out of bounds
read accesses to kernel level buffer overflows.

To exploit any of these vulnerabilities, an attacker needs control
over the answers of the connected Samba server. This could be
achieved by machine-in-the-middle attacks or by taking over the Samba
server with e. g. the recently disclosed vulnerability in Samba 3.x
(see CAN-2004-0882).

While any of these vulnerabilities can be easily used as remote denial
of service exploits against Linux systems, it is unclear if it is
possible for a skilled local or remote attacker to use any of the
possible buffer overflows for arbitrary code execution in kernel
space. So these bugs may theoretically lead to privilege escalation
and total compromise of the whole system.

[link moved to references]:

Several flaws have been found in the Linux ELF binary loader's
handling of setuid binaries. Nowadays ELF is the standard format for
Linux executables and libraries. setuid binaries are programs that
have the 'setuid' file permission bit set, they allow to execute a
program under a user id different from the calling user and are
mostly used to allow executing a program with root privileges to
normal users.

The vulnerabilities that were fixed in these updated kernel packages
could lead Denial of Service attacks. They also might lead to
execution of arbitrary code and privilege escalation on some
platforms if an attacker is able to run setuid programs under some
special system conditions (like very little remaining memory).

Another flaw could allow an attacker to read supposedly unreadable,
but executable suid binaries. The attacker can then use this to seek
faults within the executable.

[link moved to references]:

Bernard Gagnon discovered a memory leak in the mmap raw packet
socket implementation. When a client application (in ELF format)
core dumps, a region of memory stays allocated as a ring buffer.
This could be exploited by a malicious user who repeatedly crashes
certain types of applications until the memory is exhausted, thus
causing a Denial of Service.

Reverted 486 emulation patch:

Ubuntu kernels for the i386 platforms are compiled using the i486
instruction set for performance reasons. Former Ubuntu kernels
contained code which emulated the missing instructions on real 386
processors. However, several actual and potential security flaws
have been discovered in the code, and it was found to be
unsupportable. It might be possible to exploit these vulnerabilities
also on i486 and higher processors.

Therefore support for real i386 processors has ceased. This updated
kernel will only run on i486 and newer processors.

Other architectures supported by Ubuntu (amd64, powerpc) are not
affected.

Affected Software/OS:
'linux-source-2.6.8.1' package(s) on Ubuntu 4.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0883
BugTraq ID: 11695
http://www.securityfocus.com/bid/11695
Bugtraq: 20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=110072140811965&w=2
Bugtraq: 20041118 [USN-30-1] Linux kernel vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=110082989725345&w=2
CERT/CC vulnerability note: VU#726198
http://www.kb.cert.org/vuls/id/726198
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
http://security.e-matters.de/advisories/142004.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.redhat.com/support/errata/RHSA-2004-505.html
http://www.redhat.com/support/errata/RHSA-2004-537.html
http://secunia.com/advisories/13232/
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
XForce ISS Database: linux-smb-response-dos(18134)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18134
XForce ISS Database: linux-smbprocreadxdata-dos(18135)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18135
XForce ISS Database: linux-smbreceivetrans2-dos(18136)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18136
Common Vulnerability Exposure (CVE) ID: CVE-2004-0949
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360
http://www.trustix.org/errata/2004/0061/
https://www.ubuntu.com/usn/usn-30-1/
XForce ISS Database: linux-smbrecvtrans2-memory-leak(18137)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18137
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.