Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN263-1 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.12
- linux-doc-2.6.8.1
- linux-headers-2.6.10-6
- linux-headers-2.6.10-6-386
- linux-headers-2.6.10-6-686
- linux-headers-2.6.10-6-686-smp
- linux-headers-2.6.10-6-amd64-generic
- linux-headers-2.6.10-6-amd64-k8
- linux-headers-2.6.10-6-amd64-k8-smp
- linux-headers-2.6.10-6-amd64-xeon
- linux-headers-2.6.10-6-k7
- linux-headers-2.6.10-6-k7-smp
- linux-headers-2.6.10-6-power3
- linux-headers-2.6.10-6-power3
[...]

Description :

A flaw was found in the module reference counting for loadable
protocol modules of netfilter. By performing particular socket
operations, a local attacker could exploit this to crash the kernel.
This flaw only affects Ubuntu 5.10. (CVE-2005-3359)

David Howells noticed a race condition in the add_key(), request_key()
and keyctl() functions. By modifying the length of string arguments
after the kernel acertaind their length, but before the kernel copied
them into kernel memory, a local attacker could either crash the
kernel or read random parts of kernel memory (which could potentially
contain sensitive data). (CVE-2006-0457)

An information disclosure vulnerability was discovered in the
ftruncate() function for the XFS file system. Under certain
conditions, this function could expose random unallocated blocks.
A local user could potentially exploit this to recover sensitive data
from previously deleted files. (CVE-2006-0554)

A local Denial of Service vulnerability was found in the NFS client
module. By ope
[...]

Solution :

Upgrade to :
- linux-doc-2.6.10-2.6.10-34.12 (Ubuntu 5.04)
- linux-doc-2.6.12-2.6.12-10.30 (Ubuntu 5.10)
- linux-doc-2.6.8.1-2.6.8.1-16.28 (Ubuntu 4.10)
- linux-headers-2.6.10-6-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-386-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-smp-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-generic-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-k8-2.6.10-34.12 (Ubuntu 5.04)
- linu
[...]


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.