|
Family: Ubuntu Local Security Checks --> Category: infos
USN30-1 : linux-source-2.6.8.1 vulnerabilities Vulnerability Scan
Vulnerability Scan Summary linux-source-2.6.8.1 vulnerabilities
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- linux-doc-2.6.8.1
- linux-headers-2.6.8.1-3
- linux-headers-2.6.8.1-3-386
- linux-headers-2.6.8.1-3-686
- linux-headers-2.6.8.1-3-686-smp
- linux-headers-2.6.8.1-3-amd64-generic
- linux-headers-2.6.8.1-3-amd64-k8
- linux-headers-2.6.8.1-3-amd64-k8-smp
- linux-headers-2.6.8.1-3-amd64-xeon
- linux-headers-2.6.8.1-3-k7
- linux-headers-2.6.8.1-3-k7-smp
- linux-headers-2.6.8.1-3-power3
- linux-headers-2.6.8.1-3-power3-smp
- linux-headers-2.6.8.
[...]
Description :
CVE-2004-0883, CVE-2004-0949:
During an audit of the smb file system implementation within Linux,
several vulnerabilities were discovered ranging from out of bounds
read accesses to kernel level buffer overflows.
To exploit any of these vulnerabilities, a possible hacker needs control
over the answers of the connected Samba server. This could be
achieved by man-in-the-middle attacks or by taking over the Samba
server with e. g. the recently disclosed vulnerability in Samba 3.x
(see CVE-2004-0882).
While any of these vulnerabilities can be easily used as remote denial
of service exploits against Linux systems, it is unclear if it is
possible for a skilled local or remote attacker to use any of the
possible buffer overflows for arbitrary code execution in kernel
space. So these bugs may theoretically lead to privilege escalation
and total compromise of the whole system.
http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt:
Several flaws have been found in the Linux ELF binar
[...]
Solution :
Upgrade to :
- linux-doc-2.6.8.1-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-386-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-686-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-686-smp-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-amd64-generic-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-amd64-k8-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-amd64-k8-smp-2.6.8.1-16.1 (Ubuntu 4.10)
- linux-headers-2.6.8.1-3-a
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|