CERTA-2003-AVI-087
Vulnerability from certfr_avis

Plusieurs vulnérabilités sont présentes dans le noyau linux 2.4.

Description

  • Une vulnérabilité présente dans la mise en oeuvre de plusieurs tables de hachage réseau du noyau Linux permet à un utilisateur mal intentionné d'effectuer un déni de service par l'envoi massif de paquets malicieux ;
  • L'appel système ioperm permet d'appliquer les permissions sur les ports d'entrées/sorties. Une vulnérabilité présente dans celui-ci permet à un utilisateur local d'obtenir un accès en lecture et écriture aux ports d'entrées/sorties du système.

Solution

Appliquer le correctif suivant la version affectée :

  • Bulletin de sécurité #RHSA-2003:172-23 de Red Hat :

    http://rhn.redhat.com/errata/RHSA-2003-172.html
    
  • Bulletin de sécurité #RHSA-2003:187-25 de Red Hat :

    http://rhn.redhat.com/errata/RHSA-2003-187.html
    
  • Bulletin de sécurité #RHSA-2003:195-06 de Red Hat :

    http://rhn.redhat.com/errata/RHSA-2003-195.html
    
  • Bulletin de sécurité #MDKSA-2003:066-01 de Mandrake :

    http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:066-1
    
  • Bulletin de sécurité #MDKSA-2003:074 de Mandrake :

    http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074
    
  • Bulletin de sécurité #DSA 311-1 de Debian :

    http://www.debian.org/security/2003/dsa-311
    
  • Bulletin de sécurité #DSA 332-1 de Debian :

    http://www.debian.org/security/2003/dsa-332
    
None
Impacted products
Vendor Product Description
Red Hat N/A Red Hat Linux 7.3 ;
N/A N/A Mandrake Corporate Server 2.1 ;
Red Hat N/A Red Hat Linux 8.0 ;
N/A N/A Mandrake Multi Network Firewall 8.2 ;
N/A N/A Mandrake 8.2 ;
Red Hat N/A Red Hat Linux 9 ;
Red Hat N/A Red Hat Linux 7.2 ;
Red Hat N/A Mandrake 9.0 ;
Debian N/A Debian utilisant un noyau de la série 2.4.
Red Hat N/A Red Hat Linux 7.1 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Linux 7.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake Corporate Server 2.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 8.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake Multi Network Firewall 8.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake 8.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 9 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 7.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake 9.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Debian utilisant un noyau de la s\u00e9rie 2.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 7.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\n-   Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans la mise en oeuvre de plusieurs\n    tables de hachage r\u00e9seau du noyau Linux permet \u00e0 un utilisateur mal\n    intentionn\u00e9 d\u0027effectuer un d\u00e9ni de service par l\u0027envoi massif de\n    paquets malicieux ;\n-   L\u0027appel syst\u00e8me `ioperm` permet d\u0027appliquer les permissions sur les\n    ports d\u0027entr\u00e9es/sorties. Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans celui-ci\n    permet \u00e0 un utilisateur local d\u0027obtenir un acc\u00e8s en lecture et\n    \u00e9criture aux ports d\u0027entr\u00e9es/sorties du syst\u00e8me.\n\n## Solution\n\nAppliquer le correctif suivant la version affect\u00e9e :\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:172-23 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-172.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:187-25 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-187.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:195-06 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-195.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#MDKSA-2003:066-01 de Mandrake :\n\n        http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:066-1\n\n-   Bulletin de s\u00e9curit\u00e9 \\#MDKSA-2003:074 de Mandrake :\n\n        http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074\n\n-   Bulletin de s\u00e9curit\u00e9 \\#DSA 311-1 de Debian :\n\n        http://www.debian.org/security/2003/dsa-311\n\n-   Bulletin de s\u00e9curit\u00e9 \\#DSA 332-1 de Debian :\n\n        http://www.debian.org/security/2003/dsa-332\n",
  "cves": [],
  "initial_release_date": "2003-05-16T00:00:00",
  "last_revision_date": "2003-07-24T00:00:00",
  "links": [],
  "reference": "CERTA-2003-AVI-087",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-05-16T00:00:00.000000"
    },
    {
      "description": "ajout des bulletins de s\u00e9curit\u00e9 Mandrake, RedHat et Debian.",
      "revision_date": "2003-07-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le noyau linux 2.4.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans le noyau linux 2.4",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 RHSA-2003:172-23 de Red Hat",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…