Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2005.95.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-95-1)
Summary:The remote host is missing an update for the 'linux-source-2.6.8.1' package(s) announced via the USN-95-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-source-2.6.8.1' package(s) announced via the USN-95-1 advisory.

Vulnerability Insight:
A remote Denial of Service vulnerability was discovered in the
Netfilter IP packet handler. This allowed a remote attacker to crash
the machine by sending specially crafted IP packet fragments.
(CAN-2005-0209)

The Netfilter code also contained a memory leak. Certain locally
generated packet fragments are reassembled twice, which caused a
double allocation of a data structure. This could be locally exploited
to crash the machine due to kernel memory exhaustion. (CAN-2005-0210)

Ben Martel and Stephen Blackheath found a remote Denial of Service
vulnerability in the PPP driver. This allowed a malicious pppd client
to crash the server machine. (CAN-2005-0384)

Georgi Guninski discovered a buffer overflow in the ATM driver. The
atm_get_addr() function does not validate its arguments sufficiently,
which could allow a local attacker to overwrite large portions of
kernel memory by supplying a negative length argument. This could
eventually lead to arbitrary code execution. (CAN-2005-0531)

Georgi Guninski also discovered three other integer comparison
problems in the TTY layer, in the /proc interface and the ReiserFS
driver. However, the previous Ubuntu security update (kernel version
2.6.8.1-16.11) already contained a patch which checks the arguments to
these functions at a higher level and thus prevents these flaws from
being exploited. (CAN-2005-0529, CAN-2005-0530, CAN-2005-0532)

Georgi Guninski discovered an integer overflow in the sys_epoll_wait()
function which allowed local users to overwrite the first few kB of
physical memory. However, very few applications actually use this
space (dosemu is a notable exception), but potentially this could lead
to privilege escalation. (CAN-2005-0736)

Eric Anholt discovered a race condition in the Radeon DRI driver. In
some cases this allowed a local user with DRI privileges on a Radeon
card to execute arbitrary code with root privileges.

Finally this update fixes a regression in the NFS server driver
which was introduced in the previous security update (kernel version
2.6.8.1-16.11). We apologize for the inconvenience.
([link moved to references])

Affected Software/OS:
'linux-source-2.6.8.1' package(s) on Ubuntu 4.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-0209
BugTraq ID: 12598
http://www.securityfocus.com/bid/12598
Bugtraq: 20050315 [USN-95-1] Linux kernel vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=111091402626556&w=2
Conectiva Linux advisory: CLA-2005:945
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11855
http://www.redhat.com/support/errata/RHSA-2005-366.html
http://www.redhat.com/support/errata/RHSA-2005-420.html
SuSE Security Announcement: SUSE-SA:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
Common Vulnerability Exposure (CVE) ID: CVE-2005-0210
BugTraq ID: 12816
http://www.securityfocus.com/bid/12816
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.osvdb.org/14966
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10275
http://rhn.redhat.com/errata/RHSA-2005-366.html
RedHat Security Advisories: RHSA-2005:663
http://rhn.redhat.com/errata/RHSA-2005-663.html
http://secunia.com/advisories/14295
http://secunia.com/advisories/17002
http://secunia.com/advisories/17826
http://www.vupen.com/english/advisories/2005/1878
Common Vulnerability Exposure (CVE) ID: CVE-2005-0384
BugTraq ID: 12810
http://www.securityfocus.com/bid/12810
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562
http://www.redhat.com/support/errata/RHSA-2005-283.html
http://www.redhat.com/support/errata/RHSA-2005-284.html
http://www.redhat.com/support/errata/RHSA-2005-293.html
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.trustix.org/errata/2005/0009/
https://usn.ubuntu.com/95-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-0529
20050215 linux kernel 2.6 fun. windoze is a joke
http://marc.info/?l=full-disclosure&m=110846727602817&w=2
20050315 [USN-95-1] Linux kernel vulnerabilities
CLA-2005:930
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
RHSA-2005:366
SUSE-SA:2005:018
http://linux.bkbits.net:8080/linux-2.6/cset%404201818eC6aMn0x3GY_9rw3ueb2ZWQ
http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
oval:org.mitre.oval:def:8994
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8994
Common Vulnerability Exposure (CVE) ID: CVE-2005-0530
http://linux.bkbits.net:8080/linux-2.6/cset%40420181322LZmhPTewcCOLkubGwOL3w
oval:org.mitre.oval:def:10960
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10960
Common Vulnerability Exposure (CVE) ID: CVE-2005-0531
http://linux.bkbits.net:8080/linux-2.6/gnupatch%404208e1fcfccuD-eH2OGM5mBhihmQ3A
oval:org.mitre.oval:def:10095
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10095
Common Vulnerability Exposure (CVE) ID: CVE-2005-0532
Common Vulnerability Exposure (CVE) ID: CVE-2005-0736
BugTraq ID: 12763
http://www.securityfocus.com/bid/12763
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.