CERTA-2003-AVI-087

Vulnerability from certfr_avis - Published: - Updated:

Plusieurs vulnérabilités sont présentes dans le noyau linux 2.4.

Description

  • Une vulnérabilité présente dans la mise en oeuvre de plusieurs tables de hachage réseau du noyau Linux permet à un utilisateur mal intentionné d'effectuer un déni de service par l'envoi massif de paquets malicieux ;
  • L'appel système ioperm permet d'appliquer les permissions sur les ports d'entrées/sorties. Une vulnérabilité présente dans celui-ci permet à un utilisateur local d'obtenir un accès en lecture et écriture aux ports d'entrées/sorties du système.

Solution

Appliquer le correctif suivant la version affectée :

  • Bulletin de sécurité #RHSA-2003:172-23 de Red Hat :

    http://rhn.redhat.com/errata/RHSA-2003-172.html
    
  • Bulletin de sécurité #RHSA-2003:187-25 de Red Hat :

    http://rhn.redhat.com/errata/RHSA-2003-187.html
    
  • Bulletin de sécurité #RHSA-2003:195-06 de Red Hat :

    http://rhn.redhat.com/errata/RHSA-2003-195.html
    
  • Bulletin de sécurité #MDKSA-2003:066-01 de Mandrake :

    http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:066-1
    
  • Bulletin de sécurité #MDKSA-2003:074 de Mandrake :

    http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074
    
  • Bulletin de sécurité #DSA 311-1 de Debian :

    http://www.debian.org/security/2003/dsa-311
    
  • Bulletin de sécurité #DSA 332-1 de Debian :

    http://www.debian.org/security/2003/dsa-332
    
None
Impacted products
Vendor Product Description
Red Hat N/A Red Hat Linux 7.3 ;
N/A N/A Mandrake Corporate Server 2.1 ;
Red Hat N/A Red Hat Linux 8.0 ;
N/A N/A Mandrake Multi Network Firewall 8.2 ;
N/A N/A Mandrake 8.2 ;
Red Hat N/A Red Hat Linux 9 ;
Red Hat N/A Red Hat Linux 7.2 ;
Red Hat N/A Mandrake 9.0 ;
Debian N/A Debian utilisant un noyau de la série 2.4.
Red Hat N/A Red Hat Linux 7.1 ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Linux 7.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake Corporate Server 2.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 8.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake Multi Network Firewall 8.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake 8.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 9 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 7.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Mandrake 9.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Debian utilisant un noyau de la s\u00e9rie 2.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Linux 7.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\n-   Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans la mise en oeuvre de plusieurs\n    tables de hachage r\u00e9seau du noyau Linux permet \u00e0 un utilisateur mal\n    intentionn\u00e9 d\u0027effectuer un d\u00e9ni de service par l\u0027envoi massif de\n    paquets malicieux ;\n-   L\u0027appel syst\u00e8me `ioperm` permet d\u0027appliquer les permissions sur les\n    ports d\u0027entr\u00e9es/sorties. Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans celui-ci\n    permet \u00e0 un utilisateur local d\u0027obtenir un acc\u00e8s en lecture et\n    \u00e9criture aux ports d\u0027entr\u00e9es/sorties du syst\u00e8me.\n\n## Solution\n\nAppliquer le correctif suivant la version affect\u00e9e :\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:172-23 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-172.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:187-25 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-187.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#RHSA-2003:195-06 de Red Hat :\n\n        http://rhn.redhat.com/errata/RHSA-2003-195.html\n\n-   Bulletin de s\u00e9curit\u00e9 \\#MDKSA-2003:066-01 de Mandrake :\n\n        http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:066-1\n\n-   Bulletin de s\u00e9curit\u00e9 \\#MDKSA-2003:074 de Mandrake :\n\n        http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074\n\n-   Bulletin de s\u00e9curit\u00e9 \\#DSA 311-1 de Debian :\n\n        http://www.debian.org/security/2003/dsa-311\n\n-   Bulletin de s\u00e9curit\u00e9 \\#DSA 332-1 de Debian :\n\n        http://www.debian.org/security/2003/dsa-332\n",
  "cves": [],
  "links": [],
  "reference": "CERTA-2003-AVI-087",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-05-16T00:00:00.000000"
    },
    {
      "description": "ajout des bulletins de s\u00e9curit\u00e9 Mandrake, RedHat et Debian.",
      "revision_date": "2003-07-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le noyau linux 2.4.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans le noyau linux 2.4",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 RHSA-2003:172-23 de Red Hat",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…