⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_336_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 336-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53625); script_cve_id("CVE-2002-0429", "CVE-2003-0001", "CVE-2003-0127", "CVE-2003-0244", "CVE-2003-0246", "CVE-2003-0247", "CVE-2003-0248", "CVE-2003-0364"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 336-1 (kernel-source-2.2.20, kernel-image-2.2.20-i386)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to kernel-source-2.2.20, kernel-image-2.2.20-i386announced via advisory DSA 336-1.A number of vulnerabilities have been discovered in the Linux kernel.- - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c forLinux kernels 2.4.18 and earlier on x86 systems allow local users tokill arbitrary processes via a a binary compatibility interface(lcall)- - CVE-2003-0001: Multiple ethernet Network Interface Card (NIC) devicedrivers do not pad frames with null bytes, which allows remoteattackers to obtain information from previous packets or kernelmemory by using malformed packets- - CVE-2003-0127: The kernel module loader allows local users to gainroot privileges by using ptrace to attach to a child process that isspawned by the kernel- - CVE-2003-0244: The route cache implementation in Linux 2.4, and theNetfilter IP conntrack module, allows remote attackers to cause adenial of service (CPU consumption) via packets with forged sourceaddresses that cause a large number of hash table collisions relatedto the PREROUTING chain- - CVE-2003-0246: The ioperm system call in Linux kernel 2.4.20 andearlier does not properly restrict privileges, which allows localusers to gain read or write access to certain I/O ports.- - CVE-2003-0247: vulnerability in the TTY layer of the Linux kernel2.4 allows attackers to cause a denial of service ('kernel oops')- - CVE-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackersto modify CPU state registers via a malformed address.- - CVE-2003-0364: The TCP/IP fragment reassembly handling in the Linuxkernel 2.4 allows remote attackers to cause a denial of service (CPUconsumption) via certain packets that cause a large number of hashtable collisionsThis advisory provides updated 2.2.20 kernel source, and binary kernelimages for the i386 architecture.  Other architectures and kernelversions will be covered by separate advisories.For the stable distribution (woody) on the powerpc architecture, theseproblems have been fixed in kernel-source-2.2.20 version2.2.20-5woody2 and kernel-image-i386 version 2.2.20-5woody3.For the unstable distribution (sid) these problems are fixed inkernel-source-2.2.25 and kernel-image-2.2.25-i386 version 2.2.25-2.We recommend that you update your kernel packages.NOTE: A system reboot will be required immediately after the upgradein order to replace the running kernel.  Remember to read carefullyand follow the instructions given during the kernel upgrade process.NOTE: These kernels are not binary-compatible with the previousversion.  Any loadable modules will need to be recompiled in order towork with the new kernel.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20336-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 336-1 (kernel-source-2.2.20, kernel-image-2.2.20-i386)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"kernel-doc-2.2.20", ver:"2.2.20-5woody2", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-source-2.2.20", ver:"2.2.20-5woody2", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-headers-2.2.20", ver:"2.2.20-5woody3", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-headers-2.2.20-compact", ver:"2.2.20-5woody3", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-headers-2.2.20-idepci", ver:"2.2.20-5woody3", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-image-2.2.20", ver:"2.2.20-5woody3", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-image-2.2.20-compact", ver:"2.2.20-5woody3", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"kernel-image-2.2.20-idepci", ver:"2.2.20-5woody3", rls:"DEB3.0")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -