Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN131-1 : linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.8.1
- linux-headers-2.6.10-5
- linux-headers-2.6.10-5-386
- linux-headers-2.6.10-5-686
- linux-headers-2.6.10-5-686-smp
- linux-headers-2.6.10-5-amd64-generic
- linux-headers-2.6.10-5-amd64-k8
- linux-headers-2.6.10-5-amd64-k8-smp
- linux-headers-2.6.10-5-amd64-xeon
- linux-headers-2.6.10-5-k7
- linux-headers-2.6.10-5-k7-smp
- linux-headers-2.6.10-5-power3
- linux-headers-2.6.10-5-power3-smp
- linux-header
[...]

Description :

Colin Percival discovered an information disclosure in the "Hyper
Threading Technology" architecture in processors which are capable of
simultaneous multithreading (in particular Intel Pentium 4, Intel
Mobile Pentium 4, and Intel Xeon processors). This allows a malicious
thread to monitor the execution of another thread on the same CPU.
This could be exploited to steal cryptographic keys, passwords, or
other arbitrary data from unrelated processes. Since it is not
possible to provide a safe patch in a short time, HyperThreading has
been disabled in the updated kernel packages for now. You can manually
enable HyperThreading again by passing the kernel parameter "ht=on" at
boot. (CVE-2005-0109)

A Denial of Service vulnerability was discovered in the
fib_seq_start() function(). This allowed a local user to crash the
system by reading /proc/net/route in a certain way. (CVE-2005-1041)

Paul Starzetz found an integer overflow in the ELF binary format
loader's core dump function. By creating and executing a speci
[...]

Solution :

Upgrade to :
- linux-doc-2.6.10-2.6.10-34.1 (Ubuntu 5.04)
- linux-doc-2.6.8.1-2.6.8.1-16.18 (Ubuntu 4.10)
- linux-headers-2.6.10-5-2.6.10-34.1 (Ubuntu 5.04)
- linux-headers-2.6.10-5-386-2.6.10-34.1 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-2.6.10-34.1 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-smp-2.6.10-34.1 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-generic-2.6.10-34.1 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-2.6.10-34.1 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-smp-2.6.10-34.1 (Ubuntu 5
[...]


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.