⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gb_kernel_sctp_prot_violation_dos_vuln.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################ OpenVAS Vulnerability Test# $Id: gb_kernel_sctp_prot_violation_dos_vuln.nasl 362 2008-10-22 12:47:15Z oct $## Linux Kernel Stream Control Transmission Protocol Violation Vulnerability## Authors:# Chandan S <schandan@secpod.com>## Copyright:# Copyright (c) 2008 Intevation GmbH, http://www.intevation.net## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2# (or any later version), as published by the Free Software Foundation.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.###############################################################################if(description){  script_id(800036);  script_version("$Revision: 1.0 $");  script_cve_id("CVE-2008-4618");  script_bugtraq_id(31848);  script_name(english:"Linux Kernel Stream Control Transmission Protocol Violation Vulnerability");  desc["english"] = "  Overview: This host has Linux Kernel Stream Control Transmission Protocol  (SCTP) implementation and is prone to Protocol Violation Vulnerability.  Vulnerability Insight:  The issue is with the parameter 'sctp_paramhdr' in sctp_sf_violation_paramlen,  sctp_sf_abort_violation, and sctp_make_abort_violation functions of sm.h,  sm_make_chunk.c, and sm_statefunc.c files, which has invalid length and  incorrect data types in function calls.  Impact: Successful attacks will result in denial of service via kernel related  vectors.  Impact Level: System  Affected Software/OS:  Linux kernel version before 2.6.27 on all Linux Platforms.  Fix: Upgrade to Linux kernel 2.6.27, or  Apply the available patch from below link,  http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=ba0166708ef4da7eeb61dd92bbba4d5a749d6561  *****  NOTE : Ignore this warning if patch is already applied.  *****  References:  http://www.openwall.com/lists/oss-security/2008/10/06/1  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27  CVSS Score:    CVSS Base Score     : 7.8 (AV:N/AC:L/Au:NR/C:N/I:N/A:C)    CVSS Temporal Score : 5.8  Risk factor: High";  script_description(english:desc["english"]);  script_summary(english:"Check for the version of Kernel");  script_category(ACT_GATHER_INFO);  script_copyright(english:"Copyright (C) 2008 Intevation GmbH");  script_family(english:"Denial of Service");  exit(0);}include("version_func.inc");sock = ssh_login_or_reuse_connection();if(!sock){  exit(0);}kernelVer = get_bin_version(full_prog_name:"uname", version_argv:"-r",                            ver_pattern:"[0-9.]+", sock:sock);if(kernelVer){  if(version_is_less(version:kernelVer[0], test_version:"2.6.27")){    security_warning(port);  }}ssh_close_connection();

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -