Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN231-1 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.12
- linux-doc-2.6.8.1
- linux-headers-2.6.10-6
- linux-headers-2.6.10-6-386
- linux-headers-2.6.10-6-686
- linux-headers-2.6.10-6-686-smp
- linux-headers-2.6.10-6-amd64-generic
- linux-headers-2.6.10-6-amd64-k8
- linux-headers-2.6.10-6-amd64-k8-smp
- linux-headers-2.6.10-6-amd64-xeon
- linux-headers-2.6.10-6-k7
- linux-headers-2.6.10-6-k7-smp
- linux-headers-2.6.10-6-power3
- linux-headers-2.6.10-6-power3
[...]

Description :

Rudolf Polzer reported an abuse of the 'loadkeys' command. By
redefining one or more keys and tricking another user (like root) into
logging in on a text console and typing something that involves the
redefined keys, a local user could cause execution of arbitrary
commands with the rights of the target user. The updated kernel
restricts the usage of 'loadkeys' to root. (CVE-2005-3257)

The ptrace() system call did not correctly check whether a process
tried to attach to itself. A local attacker could exploit this to
cause a kernel crash. (CVE-2005-3783)

A Denial of Service vulnerability was found in the handler that
automatically cleans up and terminates child processes that are not
correctly handled by their parent process ("auto-reaper"). The check
did not correctly handle processes which were currently traced by
another process. A local attacker could exploit this to cause a kernel
crash. (CVE-2005-3784)

A locking problem was discovered in the POSIX timer cleanup handling
on process exit. A loca
[...]

Solution :

Upgrade to :
- linux-doc-2.6.10-2.6.10-34.9 (Ubuntu 5.04)
- linux-doc-2.6.12-2.6.12-10.25 (Ubuntu 5.10)
- linux-doc-2.6.8.1-2.6.8.1-16.26 (Ubuntu 4.10)
- linux-headers-2.6.10-6-2.6.10-34.9 (Ubuntu 5.04)
- linux-headers-2.6.10-6-386-2.6.10-34.9 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-2.6.10-34.9 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-smp-2.6.10-34.9 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-generic-2.6.10-34.9 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-k8-2.6.10-34.9 (Ubuntu 5.04)
- linux-heade
[...]


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.