📄 deb_1363_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1363-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(58585); script_cve_id("CVE-2007-2172", "CVE-2007-2875", "CVE-2007-3105", "CVE-2007-3843", "CVE-2007-4308"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 1363-1 (linux-2.6)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to linux-2.6announced via advisory DSA 1363-1.Several local and remote vulnerabilities have been discovered in the Linuxkernel that may lead to a denial of service or the execution of arbitrarycode. The Common Vulnerabilities and Exposures project identifies thefollowing problems:CVE-2007-2172Thomas Graf reported a typo in the IPV4 protocol handler that couldbe used by a local attacker to overrun an array via crafted packets,potentially resulting in a Denial of Service (system crash).The DECnet counterpart of this issue was already fixed in DSA-1356.CVE-2007-2875iDefense reported a potential integer underflow in the cpuset filesystemwhich may permit local attackers to gain access to sensitive kernelmemory. This vulnerability is only exploitable if the cpuset filesystemis mounted.CVE-2007-3105The PaX Team discovered a potential buffer overflow in the random numbergenerator which may permit local users to cause a denial of service orgain additional privileges. This issue is not believed to effect defaultDebian installations where only root has sufficient privileges to exploitit.CVE-2007-3843A coding error in the CIFS subsystem permits the use of unsigned messageseven if the client has been configured the system to enforcesigning by passing the sec=ntlmv2i mount option. This may allow remoteattackers to spoof CIFS network traffic.CVE-2007-4308Alan Cox reported an issue in the aacraid driver that allows unprivilegedlocal users to make ioctl calls which should be restricted to adminprivileges.These problems have been fixed in the stable distribution in version2.6.18.dfsg.1-13etch2.The following matrix lists additional packages that were rebuilt forcompatibility with or to take advantage of this update:Debian 4.0 (etch)fai-kernels 1.17+etch5user-mode-linux 2.6.18-1um-2etch4We recommend that you upgrade your kernel package immediately and rebootSolution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201363-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1363-1 (linux-2.6)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"linux-doc-2.6.18", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-manual-2.6.18", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-patch-debian-2.6.18", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-source-2.6.18", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-support-2.6.18-5", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-tree-2.6.18", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-alpha", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-generic", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-legacy", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-smp", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-alpha", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-generic", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-legacy", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-smp", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-alpha", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-arm", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-footbridge", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-iop32x", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-ixp4xx", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-rpc", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-s3c2410", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-footbridge", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-iop32x", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-ixp4xx", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-rpc", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-s3c2410", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-hppa", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc", ver:"2.6.18.dfsg.1-13etch2", rls:"DEB4.0")) { vuln = 1;}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -