Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA1017] DSA-1017-1 kernel-source-2.6.8 Vulnerability Scan


Vulnerability Scan Summary
DSA-1017-1 kernel-source-2.6.8

Detailed Explanation for this Vulnerability Test

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:
Multiple overflows exist in the io_edgeport driver which might be usable
as a denial of service attack vector.
Bryan Fulton reported a bounds checking bug in the coda_pioctl function
which may allow local users to execute arbitrary code or trigger a denial
of service attack.
An error in the skb_checksum_help() function from the netfilter framework
has been discovered that allows the bypass of packet filter rules or
a denial of service attack.
Tim Yamin discovered that insufficient input validation in the zisofs driver
for compressed ISO file systems allows a denial of service attack through
maliciously crafted ISO images.
A buffer overflow in the sendmsg() function allows local users to execute
arbitrary code.
Herbert Xu discovered that the setsockopt() function was not restricted to
users/processes with the CAP_NET_ADMIN capability. This allows attackers to
manipulate IPSEC policies or initiate a denial of service attack.
Al Viro discovered a race condition in the /proc handling of network devices.
A (local) attacker could exploit the stale reference after interface shutdown
to cause a denial of service or possibly execute code in kernel mode.
Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices
leak memory, which allows a denial of service attack.
Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code
can be forced into an endless loop, which allows a denial of service attack.
Vasiliy Averin discovered that the reference counters from sockfd_put() and
fput() can be forced into overlapping, which allows a denial of service attack
through a null pointer dereference.
Eric Dumazet discovered that the set_mempolicy() system call accepts a negative
value for its first argument, which triggers a BUG() assert. This allows a
denial of service attack.
Harald Welte discovered that if a process issues a USB Request Block (URB)
to a device and terminates before the URB completes, a stale pointer
would be dereferenced. This could be used to trigger a denial of service
attack.
Pavel Roskin discovered that the driver for Orinoco wireless cards clears
its buffers insufficiently. This could leak sensitive information into
user space.
Robert Derr discovered that the audit subsystem uses an incorrect function to
free memory, which allows a denial of service attack.
Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.
Doug Chapman discovered that the mq_open syscall can be tricked into
decrementing an internal counter twice, which allows a denial of service attack
through a kernel panic.
Doug Chapman discovered that pass
[...]

Solution : http://www.debian.org/security/2006/dsa-1017
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.