⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_1378_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
📖 第 1 页 / 共 2 页
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1378-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(58636); script_cve_id("CVE-2007-3731", "CVE-2007-3739", "CVE-2007-3740", "CVE-2007-4573", "CVE-2007-4849"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 1378-1 (linux-2.6)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to linux-2.6announced via advisory DSA 1378-1.Several local and remote vulnerabilities have been discovered in the Linuxkernel that may lead to a denial of service or the execution of arbitrarycode. The Common Vulnerabilities and Exposures project identifies thefollowing problems:CVE-2007-3731Evan Teran discovered a potential local denial of service (oops) inthe handling of PTRACE_SETREGS and PTRACE_SINGLESTEP requests.CVE-2007-3739Adam Litke reported a potential local denial of service (oops) onpowerpc platforms resulting from unchecked VMA expansion into addressspace reserved for hugetlb pages.CVE-2007-3740Steve French reported that CIFS filesystems with CAP_UNIX enabledwere not honoring a process' umask which may lead to unintentinallyrelaxed permissions.CVE-2007-4573Wojciech Purczynski discovered a vulnerability that can be exploitdby a local user to obtain superuser privileges on x86_64 systems.This resulted from improper clearing of the high bits of registersduring ia32 system call emulation. This vulnerability is relevantto the Debian amd64 port as well as users of the i386 port who runthe amd64 linux-image flavour.CVE-2007-4849Michael Stone reported an issue with the JFFS2 filesystem. Legacymodes for inodes that were created with POSIX ACL support enabledwere not being written out to the medium, resulting in incorrectpermissions upon remount.These problems have been fixed in the stable distribution in version2.6.18.dfsg.1-13etch3.At the time of this advisory, the build for the arm architecture hasnot yet completed. This advisory will be updated once the arm buildis available.The following matrix lists additional packages that were rebuilt forcompatibility with or to take advantage of this update:Debian 4.0 (etch)fai-kernels                 1.17+etch.13etch3user-mode-linux             2.6.18-1um-2etch.13etch3We recommend that you upgrade your kernel package immediately and rebootSolution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201378-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1378-1 (linux-2.6)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"linux-doc-2.6.18", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-manual-2.6.18", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-patch-debian-2.6.18", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-source-2.6.18", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-support-2.6.18-5", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-tree-2.6.18", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-alpha", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-generic", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-legacy", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-alpha-smp", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-alpha", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-generic", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-legacy", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-alpha-smp", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-alpha", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"fai-kernels", ver:"1.17+etch.13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-hppa", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc-smp", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-parisc64-smp", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc-smp", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-parisc64", ver:"2.6.18.dfsg.1-13etch3", rls:"DEB4.0")) {

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -