Vulnerabilities > CVE-2002-0060 - Unspecified vulnerability in Linux Kernel 2.3.99/2.4.18
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
IRC connection tracking helper module in the netfilter subsystem for Linux 2.4.18-pre9 and earlier does not properly set the mask for conntrack expectations for incoming DCC connections, which could allow remote attackers to bypass intended firewall restrictions.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 |
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRAKE_MDKSA-2002-041.NASL |
description | A problem was discovered in the CIPE (VPN tunnel) implementation in the Linux kernel where a malformed packet could cause a crash. Andrew Griffiths discovered a vulnerability that allows remote machines to read random memory by utilizing a bug in the ICMP implementation of Linux kernels. This only affects kernels prior to 2.4.0-test6 and 2.2.18; all Mandrake Linux 2.4 kernels are not vulnerable to this problem. Another problem was discovered by the Linux Netfilter team in the IRC connection tracking component of netfilter in Linux 2.4 kernels. It consists of a very broad netmask setting which is applied to check if an IRC DCC connection through a masqueraded firewall should be allowed. This would lead to unwanted ports being opened on the firewall which could possibly allow inbound connections depending on the firewall rules in use. The 2.2 and 2.4 kernels are also affected by the zlib double-free() problem as routines from the compression library are used by functions that uncompress filesystems loaded into ramdisks and other occassions that are not security-critical. The kernel also uses the compression library in the PPP layer as well as the freeswan IPSec kernel module. As well, a number of other non-security fixes are present in these kernels, including new and enhanced drivers, LSB compliance, and more. MandrakeSoft encourages all users to upgrade their kernel as soon as possible to these new 2.2 and 2.4 kernels. NOTE: This update cannot be accomplished via MandrakeUpdate; it must be done on the console. This prevents one from upgrading a kernel instead of installing a new kernel. To upgrade, please ensure that you have first upgraded iptables, mkinitrd, and initscripts packages if they are applicable to your platform. Use |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 13945 |
published | 2004-07-31 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/13945 |
title | Mandrake Linux Security Advisory : kernel (MDKSA-2002:041) |
Redhat
advisories |
|
References
- http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:041
- http://marc.info/?l=bugtraq&m=101483396412051&w=2
- http://marc.info/?l=vuln-dev&m=101486352429653&w=2
- http://www.kb.cert.org/vuls/id/230307
- http://www.netfilter.org/security/2002-02-25-irc-dcc-mask.html
- http://www.redhat.com/support/errata/RHSA-2002-028.html
- http://www.securityfocus.com/bid/4188
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0203-027
- https://exchange.xforce.ibmcloud.com/vulnerabilities/8302