Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN95-1 : linux-source-2.6.8.1 vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
linux-source-2.6.8.1 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.8.1
- linux-headers-2.6.8.1-5
- linux-headers-2.6.8.1-5-386
- linux-headers-2.6.8.1-5-686
- linux-headers-2.6.8.1-5-686-smp
- linux-headers-2.6.8.1-5-amd64-generic
- linux-headers-2.6.8.1-5-amd64-k8
- linux-headers-2.6.8.1-5-amd64-k8-smp
- linux-headers-2.6.8.1-5-amd64-xeon
- linux-headers-2.6.8.1-5-k7
- linux-headers-2.6.8.1-5-k7-smp
- linux-headers-2.6.8.1-5-power3
- linux-headers-2.6.8.1-5-power3-smp
- linux-headers-2.6.8.
[...]

Description :

A remote Denial of Service vulnerability was discovered in the
Netfilter IP packet handler. This allowed a remote attacker to crash
the machine by sending specially crafted IP packet fragments.
(CVE-2005-0209)

The Netfilter code also contained a memory leak. Certain locally
generated packet fragments are reassembled twice, which caused a
double allocation of a data structure. This could be locally exploited
to crash the machine due to kernel memory exhaustion. (CVE-2005-0210)

Ben Martel and Stephen Blackheath found a remote Denial of Service
vulnerability in the PPP driver. This allowed a malicious pppd client
to crash the server machine. (CVE-2005-0384)

Georgi Guninski discovered a buffer overflow in the ATM driver. The
atm_get_addr() function does not validate its arguments sufficiently,
which could allow a local attacker to overwrite large portions of
kernel memory by supplying a negative length argument. This could
eventually lead to arbitrary code execution. (CVE-2005-0531)

Georgi Guninski also disc
[...]

Solution :

Upgrade to :
- linux-doc-2.6.8.1-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-386-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-686-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-686-smp-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-amd64-generic-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-amd64-k8-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6.8.1-5-amd64-k8-smp-2.6.8.1-16.12 (Ubuntu 4.10)
- linux-headers-2.6
[...]


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.