Vulnerabilities > CVE-2003-0244 - Remote Denial Of Service vulnerability in Linux Kernel 2.4.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
linux
nessus

Summary

The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.

Vulnerable Configurations

Part Description Count
OS
Linux
1

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-442.NASL
    descriptionSeveral security related problems have been fixed in the Linux kernel 2.4.17 used for the S/390 architecture, mostly by backporting fixes from 2.4.18 and incorporating recent security fixes. The corrections are listed below with the identification from the Common Vulnerabilities and Exposures (CVE) project : - CVE-2002-0429 : The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall). - CAN-2003-0001 : Multiple ethernet network interface card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. - CAN-2003-0244 : The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain. - CAN-2003-0246 : The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CAN-2003-0247 : A vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (
    last seen2020-06-01
    modified2020-06-02
    plugin id15279
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/15279
    titleDebian DSA-442-1 : linux-kernel-2.4.17-s390 - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-442. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15279);
      script_version("1.33");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2002-0429", "CVE-2003-0001", "CVE-2003-0244", "CVE-2003-0246", "CVE-2003-0247", "CVE-2003-0248", "CVE-2003-0364", "CVE-2003-0961", "CVE-2003-0985", "CVE-2004-0077");
      script_bugtraq_id(4259, 6535, 7600, 7601, 7791, 7793, 7797, 9138, 9356, 9686);
      script_xref(name:"CERT", value:"981222");
      script_xref(name:"DSA", value:"442");
    
      script_name(english:"Debian DSA-442-1 : linux-kernel-2.4.17-s390 - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several security related problems have been fixed in the Linux kernel
    2.4.17 used for the S/390 architecture, mostly by backporting fixes
    from 2.4.18 and incorporating recent security fixes. The corrections
    are listed below with the identification from the Common
    Vulnerabilities and Exposures (CVE) project :
    
      - CVE-2002-0429 :
        The iBCS routines in arch/i386/kernel/traps.c for Linux
        kernels 2.4.18 and earlier on x86 systems allow local
        users to kill arbitrary processes via a binary
        compatibility interface (lcall).
    
      - CAN-2003-0001 :
    
        Multiple ethernet network interface card (NIC) device
        drivers do not pad frames with null bytes, which allows
        remote attackers to obtain information from previous
        packets or kernel memory by using malformed packets, as
        demonstrated by Etherleak.
    
      - CAN-2003-0244 :
    
        The route cache implementation in Linux 2.4, and the
        Netfilter IP conntrack module, allows remote attackers
        to cause a denial of service (CPU consumption) via
        packets with forged source addresses that cause a large
        number of hash table collisions related to the
        PREROUTING chain.
    
      - CAN-2003-0246 :
    
        The ioperm system call in Linux kernel 2.4.20 and
        earlier does not properly restrict privileges, which
        allows local users to gain read or write access to
        certain I/O ports.
    
      - CAN-2003-0247 :
    
        A vulnerability in the TTY layer of the Linux kernel 2.4
        allows attackers to cause a denial of service ('kernel
        oops').
    
      - CAN-2003-0248 :
    
        The mxcsr code in Linux kernel 2.4 allows attackers to
        modify CPU state registers via a malformed address.
    
      - CAN-2003-0364 :
    
        The TCP/IP fragment reassembly handling in the Linux
        kernel 2.4 allows remote attackers to cause a denial of
        service (CPU consumption) via certain packets that cause
        a large number of hash table collisions.
    
      - CAN-2003-0961 :
    
        An integer overflow in brk() system call (do_brk()
        function) for Linux allows a local attacker to gain root
        privileges. Fixed upstream in Linux 2.4.23.
    
      - CAN-2003-0985 :
    
        Paul Starzetz discovered a flaw in bounds checking in
        mremap() in the Linux kernel (present in version 2.4.x
        and 2.6.x) which may allow a local attacker to gain root
        privileges. Version 2.2 is not affected by this bug.
        Fixed upstream in Linux 2.4.24.
    
      - CAN-2004-0077 :
    
        Paul Starzetz and Wojciech Purczynski of isec.pl
        discovered a critical security vulnerability in the
        memory management code of Linux inside the mremap(2)
        system call. Due to missing function return value check
        of internal functions a local attacker can gain root
        privileges. Fixed upstream in Linux 2.4.25 and 2.6.3."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://isec.pl/vulnerabilities/isec-0013-mremap.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2004/dsa-442"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the Linux kernel packages immediately.
    
    For the stable distribution (woody) these problems have been fixed in
    version 2.4.17-2.woody.3 of s390 images and in version
    0.0.20020816-0.woody.2 of the patch packages.
    
     Vulnerability matrix for CAN-2004-0077"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:kernel-image-2.4.17-s390");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:kernel-patch-2.4.17-s390");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2004/02/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.17", reference:"2.4.17-2.woody.3")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.17-s390", reference:"2.4.17-2.woody.3")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-patch-2.4.17-s390", reference:"0.0.20020816-0.woody.2")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-147.NASL
    descriptionThese updated kernel packages address security vulnerabilites, including two possible data corruption scenarios. In addition, a number of drivers have been updated, improvements made to system performance, and various issues have been resolved. The Linux kernel handles the basic functions of the operating system. Two potential data corruption scenarios have been identified. These scenarios can occur under heavy, complex I/O loads. The first scenario only occurs while performing memory mapped file I/O, where the file is simultaneously unlinked and the corresponding file blocks reallocated. Furthermore, the memory mapped must be to a partial page at the end of a file on an ext3 file system. As such, Red Hat considers this scenario unlikely. The second scenario was exhibited in systems with more than 4 GB of memory with a storage controller capable of block device DMA above 4GB (64-bit DMA). By restricting storage drivers to 32-bit DMA, the problem was resolved. Prior to this errata, the SCSI subsystem was already restricted to 32-bit DMA; this errata extends the restriction to block drivers as well. The change consists of disabling 64-bit DMA in the cciss driver (the HP SA5xxx and SA6xxx RAID controllers). The performance implications of this change to the cciss driver are minimal. In addition, the following security vulnerabilities have been addressed : A flaw was found in several hash table implementations in the kernel networking code. A remote attacker sending packets with carefully chosen, forged source addresses could potentially cause every routing cache entry to be hashed into the same hash chain. As a result, the kernel would use a disproportionate amount of processor time to deal with the new packets, leading to a remote denial-of-service (DoS) attack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0244 to this issue. A flaw was also found in the
    last seen2020-06-01
    modified2020-06-02
    plugin id12390
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12390
    titleRHEL 2.1 : kernel (RHSA-2003:147)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2003:147. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(12390);
      script_version ("1.27");
      script_cvs_date("Date: 2019/10/25 13:36:10");
    
      script_cve_id("CVE-2003-0244", "CVE-2003-0246");
      script_xref(name:"RHSA", value:"2003:147");
    
      script_name(english:"RHEL 2.1 : kernel (RHSA-2003:147)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "These updated kernel packages address security vulnerabilites,
    including two possible data corruption scenarios. In addition, a
    number of drivers have been updated, improvements made to system
    performance, and various issues have been resolved.
    
    The Linux kernel handles the basic functions of the operating system.
    
    Two potential data corruption scenarios have been identified. These
    scenarios can occur under heavy, complex I/O loads.
    
    The first scenario only occurs while performing memory mapped file
    I/O, where the file is simultaneously unlinked and the corresponding
    file blocks reallocated. Furthermore, the memory mapped must be to a
    partial page at the end of a file on an ext3 file system. As such, Red
    Hat considers this scenario unlikely.
    
    The second scenario was exhibited in systems with more than 4 GB of
    memory with a storage controller capable of block device DMA above 4GB
    (64-bit DMA). By restricting storage drivers to 32-bit DMA, the
    problem was resolved. Prior to this errata, the SCSI subsystem was
    already restricted to 32-bit DMA; this errata extends the restriction
    to block drivers as well. The change consists of disabling 64-bit DMA
    in the cciss driver (the HP SA5xxx and SA6xxx RAID controllers). The
    performance implications of this change to the cciss driver are
    minimal.
    
    In addition, the following security vulnerabilities have been
    addressed :
    
    A flaw was found in several hash table implementations in the kernel
    networking code. A remote attacker sending packets with carefully
    chosen, forged source addresses could potentially cause every routing
    cache entry to be hashed into the same hash chain. As a result, the
    kernel would use a disproportionate amount of processor time to deal
    with the new packets, leading to a remote denial-of-service (DoS)
    attack. The Common Vulnerabilities and Exposures project
    (cve.mitre.org) has assigned the name CVE-2003-0244 to this issue.
    
    A flaw was also found in the 'ioperm' system call, which fails to
    properly restrict privileges. This flaw can allow an unprivileged
    local user to gain read and write access to I/O ports on the system.
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2003-0246 to this issue.
    
    In addition, the following drivers have been updated to the versions
    indicated :
    
    -aacraid: 0.9.9ac6-TEST -qlogic qla2100, qla2200, qla2300: 6.04.01
    -aic7xxx_mod: 6.2.30 and aic79xx: 1.3.4 -ips: v6.00.26 -cpqfc: 2.1.2
    -fusion: 2.05.00 -e100: 2.2.21-k1 -e1000: 5.0.43-k1, and added netdump
    support -natsemi: 1.07+LK1.0.17 -cciss: 2.4.45. -cpqarray: 2.4.26
    
    If the system is configured to use alternate drivers, we recommend
    applying the kudzu errata RHEA-2003:132 prior to updating the kernel.
    
    A number of edge conditions in the virtual memory system have been
    identified and resolved. These included the elimination of memory
    allocation failures occuring when the system had not depleted all of
    the physical memory. This would typically lead to process creation and
    network driver failures, and general performance degradation.
    Additional memory reclamation improvements were introduced to further
    smooth out the natural system performance degradation that occur under
    memory exhaustion conditions.
    
    In addition, the latest summit patches have been included.
    
    All users should upgrade to these errata packages, which address these
    issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2003-0244"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2003-0246"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2003:147"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-enterprise");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-headers");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-smp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-source");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-summit");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:2.1");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2003/05/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2003/05/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/06");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    include("ksplice.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^2\.1([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 2.1", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    if (get_one_kb_item("Host/ksplice/kernel-cves"))
    {
      rm_kb_item(name:"Host/uptrack-uname-r");
      cve_list = make_list("CVE-2003-0244", "CVE-2003-0246");
      if (ksplice_cves_check(cve_list))
      {
        audit(AUDIT_PATCH_INSTALLED, "KSplice hotfix for RHSA-2003:147");
      }
      else
      {
        __rpm_report = ksplice_reporting_text();
      }
    }
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2003:147";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL2.1", cpu:"i686", reference:"kernel-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kernel-BOOT-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i686", reference:"kernel-debug-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kernel-doc-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i686", reference:"kernel-enterprise-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kernel-headers-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i686", reference:"kernel-smp-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kernel-source-2.4.9-e.24")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i686", reference:"kernel-summit-2.4.9-e.24")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel / kernel-BOOT / kernel-debug / kernel-doc / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-145.NASL
    description The remote host is running a kernel which is vulnerable to a remote denial of service. The Linux kernel handles all the low-level functionality of the Operating System. This version of the kernel is vulnerable to a flaw wherein a remote attacker can forge source IP addresses in such a way as to create a very long routing hash chain. An attacker, exploiting this flaw, would need the ability to craft TCP/IP packets destined to (or through) the Linux kernel. A successful attack would shut down the server.
    last seen2020-04-01
    modified2020-04-02
    plugin id12388
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12388
    titleRHSA-2003-145: kernel
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # @DEPRECATED@
    #
    # Disabled on 2020/04/09. Package fix no longer available for this end of life OS.
    
    include("compat.inc");
    if ( ! defined_func("bn_random") ) exit(0);
    if(description)
    {
     script_id(12388);
     script_version ("1.12");
    script_cve_id("CVE-2003-0244");
    			
     script_name(english:"RHSA-2003-145: kernel (deprecated)");
     script_set_attribute(attribute:"synopsis", value:
    "This plugin has been deprecated");
     
     script_set_attribute(attribute:"description", value:
    '
    The remote host is running a kernel which is vulnerable to a remote denial 
    of service.  
    
    The Linux kernel handles all the low-level functionality of the Operating
    System.  This version of the kernel is vulnerable to a flaw wherein a remote
    attacker can forge source IP addresses in such a way as to create a very
    long routing hash chain.  An attacker, exploiting this flaw, would need
    the ability to craft TCP/IP packets destined to (or through) the Linux kernel.
    A successful attack would shut down the server.
    
    The associated package for this end-of-life OS is no longer available.');
     script_set_attribute(attribute:"see_also", value: "http://rhn.redhat.com/errata/RHSA-2003-145.html");
     script_set_attribute(attribute:"solution", value: "n/a");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/06");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/20");
     script_end_attributes();
     
     script_summary(english: "Check for the version of the kernel package"); 
     script_category(ACT_GATHER_INFO);
     
     script_copyright(english:"This script is Copyright (C) 2004-2020 Tenable Network Security, Inc.");
     script_family(english: "Red Hat Local Security Checks"); 
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/RedHat/rpm-list");
     exit(0);
    }
    # Deprecated.
    exit(0, "The associated package for this end-of-life OS is no longer available.");
    
    #include("rpm.inc");
    
    if ( rpm_check( reference:"kernel-2.4.18-e.31", release:"RHEL2.1", cpu:"ia64") ) 
    	security_warning(port:0, extra:rpm_report_get());
    
    exit(0, "Host is not affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-311.NASL
    descriptionA number of vulnerabilities have been discovered in the Linux kernel. CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall). CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets. CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain. CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. CAN-2003-0247: Vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (
    last seen2020-06-01
    modified2020-06-02
    plugin id15148
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15148
    titleDebian DSA-311-1 : linux-kernel-2.4.18 - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-311. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15148);
      script_version("1.24");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2002-0429", "CVE-2003-0001", "CVE-2003-0127", "CVE-2003-0244", "CVE-2003-0246", "CVE-2003-0247", "CVE-2003-0248", "CVE-2003-0364");
      script_xref(name:"DSA", value:"311");
    
      script_name(english:"Debian DSA-311-1 : linux-kernel-2.4.18 - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A number of vulnerabilities have been discovered in the Linux kernel.
    
    CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
    kernels 2.4.18 and earlier on x86 systems allow local users to kill
    arbitrary processes via a binary compatibility interface (lcall).
    
    CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
    drivers do not pad frames with null bytes, which allows remote
    attackers to obtain information from previous packets or kernel memory
    by using malformed packets.
    
    CAN-2003-0127: The kernel module loader allows local users to gain
    root privileges by using ptrace to attach to a child process that is
    spawned by the kernel.
    
    CAN-2003-0244: The route cache implementation in Linux 2.4, and the
    Netfilter IP conntrack module, allows remote attackers to cause a
    denial of service (CPU consumption) via packets with forged source
    addresses that cause a large number of hash table collisions related
    to the PREROUTING chain.
    
    CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and
    earlier does not properly restrict privileges, which allows local
    users to gain read or write access to certain I/O ports.
    
    CAN-2003-0247: Vulnerability in the TTY layer of the Linux kernel 2.4
    allows attackers to cause a denial of service ('kernel oops').
    
    CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
    modify CPU state registers via a malformed address.
    
    CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
    kernel 2.4 allows remote attackers to cause a denial of service (CPU
    consumption) via certain packets that cause a large number of hash
    table collisions.
    
    This advisory covers only the i386 (Intel IA32) architectures. Other
    architectures will be covered by separate advisories."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2003/dsa-311"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "For the stable distribution (woody) on the i386 architecture, these
    problems have been fixed in kernel-source-2.4.18 version 2.4.18-9,
    kernel-image-2.4.18-1-i386 version 2.4.18-8, and
    kernel-image-2.4.18-i386bf version 2.4.18-5woody1.
    
    We recommend that you update your kernel packages.
    
    If you are using the kernel installed by the installation system when
    the 'bf24' option is selected (for a 2.4.x kernel), you should install
    the kernel-image-2.4.18-bf2.4 package. If you installed a different
    kernel-image package after installation, you should install the
    corresponding 2.4.18-1 kernel. You may use the table below as a guide.
    
    | If 'uname -r' shows: | Install this package: | 2.4.18-bf2.4 |
    kernel-image-2.4.18-bf2.4 | 2.4.18-386 | kernel-image-2.4.18-1-386 |
    2.4.18-586tsc | kernel-image-2.4.18-1-586tsc | 2.4.18-686 |
    kernel-image-2.4.18-1-686 | 2.4.18-686-smp |
    kernel-image-2.4.18-1-686-smp | 2.4.18-k6 | kernel-image-2.4.18-1-k6 |
    2.4.18-k7 | kernel-image-2.4.18-1-k7
    
    NOTE: that this kernel is not binary compatible with the previous
    version. For this reason, the kernel has a different version number
    and will not be installed automatically as part of the normal upgrade
    process. Any custom modules will need to be rebuilt in order to work
    with the new kernel. New PCMCIA modules are provided for all of the
    above kernels.
    
    NOTE: A system reboot will be required immediately after the upgrade
    in order to replace the running kernel. Remember to read carefully and
    follow the instructions given during the kernel upgrade process."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:kernel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2003/06/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.0", prefix:"kernel-doc-2.4.18", reference:"2.4.18-9")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1-386", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1-586tsc", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1-686", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1-686-smp", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1-k6", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-1-k7", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18-bf2.4", reference:"2.4.18-5woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-1-386", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-1-586tsc", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-1-686", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-1-686-smp", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-1-k6", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-1-k7", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-bf2.4", reference:"2.4.18-5woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-pcmcia-modules-2.4.18-1-386", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-pcmcia-modules-2.4.18-1-586tsc", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-pcmcia-modules-2.4.18-1-686", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-pcmcia-modules-2.4.18-1-686-smp", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-pcmcia-modules-2.4.18-1-k6", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-pcmcia-modules-2.4.18-1-k7", reference:"2.4.18-8")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-source-2.4.18", reference:"2.4.18-9")) flag++;
    if (deb_check(release:"3.0", prefix:"pcmcia-modules-2.4.18-bf2.4", reference:"3.1.33-6woody1k5woody1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-312.NASL
    descriptionA number of vulnerabilities have been discovered in the Linux kernel. CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall). CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets. CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain. CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. CAN-2003-0247: Vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (
    last seen2020-06-01
    modified2020-06-02
    plugin id15149
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15149
    titleDebian DSA-312-1 : kernel-patch-2.4.18-powerpc - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-312. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15149);
      script_version("1.25");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2002-0429", "CVE-2003-0001", "CVE-2003-0127", "CVE-2003-0244", "CVE-2003-0246", "CVE-2003-0247", "CVE-2003-0248", "CVE-2003-0364");
      script_bugtraq_id(6535, 7112, 7600, 7601, 7791, 7793, 7797);
      script_xref(name:"DSA", value:"312");
    
      script_name(english:"Debian DSA-312-1 : kernel-patch-2.4.18-powerpc - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A number of vulnerabilities have been discovered in the Linux kernel.
    
    CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
    kernels 2.4.18 and earlier on x86 systems allow local users to kill
    arbitrary processes via a binary compatibility interface (lcall).
    
    CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
    drivers do not pad frames with null bytes, which allows remote
    attackers to obtain information from previous packets or kernel memory
    by using malformed packets.
    
    CAN-2003-0127: The kernel module loader allows local users to gain
    root privileges by using ptrace to attach to a child process that is
    spawned by the kernel.
    
    CAN-2003-0244: The route cache implementation in Linux 2.4, and the
    Netfilter IP conntrack module, allows remote attackers to cause a
    denial of service (CPU consumption) via packets with forged source
    addresses that cause a large number of hash table collisions related
    to the PREROUTING chain.
    
    CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and
    earlier does not properly restrict privileges, which allows local
    users to gain read or write access to certain I/O ports.
    
    CAN-2003-0247: Vulnerability in the TTY layer of the Linux kernel 2.4
    allows attackers to cause a denial of service ('kernel oops').
    
    CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
    modify CPU state registers via a malformed address.
    
    CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
    kernel 2.4 allows remote attackers to cause a denial of service (CPU
    consumption) via certain packets that cause a large number of hash
    table collisions.
    
    This advisory covers only the powerpc architecture. Other
    architectures will be covered by separate advisories."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2003/dsa-312"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "For the stable distribution (woody) on the powerpc architecture, these
    problems have been fixed in version 2.4.18-1woody1.
    
    We recommend that you update your kernel packages.
    
    NOTE: A system reboot will be required immediately after the upgrade
    in order to replace the running kernel. Remember to read carefully and
    follow the instructions given during the kernel upgrade process."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:kernel-patch-2.4.18-powerpc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2003/06/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.0", prefix:"kernel-headers-2.4.18", reference:"2.4.18-1woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-newpmac", reference:"2.4.18-1woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-powerpc", reference:"2.4.18-1woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-image-2.4.18-powerpc-smp", reference:"2.4.18-1woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"kernel-patch-2.4.18-powerpc", reference:"2.4.18-1woody1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2003-074.NASL
    descriptionMultiple vulnerabilities were discovered and fixed in the Linux kernel. - CVE-2003-0001: Multiple ethernet network card drivers do not pad frames with null bytes which allows remote attackers to obtain information from previous packets or kernel memory by using special malformed packets. - CVE-2003-0244: The route cache implementation in the 2.4 kernel and the Netfilter IP conntrack module allows remote attackers to cause a Denial of Service (DoS) via CPU consumption due to packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain. - CVE-2003-0246: The ioperm implementation in 2.4.20 and earlier kernels does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2003-0247: A vulnerability in the TTY layer of the 2.4 kernel allows attackers to cause a kernel oops resulting in a DoS. - CVE-2003-0248: The mxcsr code in the 2.4 kernel allows attackers to modify CPU state registers via a malformed address. - CVE-2003-0462: A file read race existed in the execve() system call. Kernels for 9.1/x86 are also available (see MDKSA-2003:066). MandrakeSoft encourages all users to upgrade to these new kernels. For full instructions on how to properly upgrade your kernel, please review http://www.mandrakesecure.net/en/docs/magic.php.
    last seen2020-06-01
    modified2020-06-02
    plugin id14057
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14057
    titleMandrake Linux Security Advisory : kernel (MDKSA-2003:074)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2003-066.NASL
    descriptionMultiple vulnerabilities were discovered and fixed in the Linux kernel. - CVE-2003-0001: Multiple ethernet network card drivers do not pad frames with null bytes which allows remote attackers to obtain information from previous packets or kernel memory by using special malformed packets. - CVE-2003-0244: The route cache implementation in the 2.4 kernel and the Netfilter IP conntrack module allows remote attackers to cause a Denial of Service (DoS) via CPU consumption due to packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain. - CVE-2003-0246: The ioperm implementation in 2.4.20 and earlier kernels does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CVE-2003-0247: A vulnerability in the TTY layer of the 2.4 kernel allows attackers to cause a kernel oops resulting in a DoS. - CVE-2003-0248: The mxcsr code in the 2.4 kernel allows attackers to modify CPU state registers via a malformed address. - CVE-2003-0462: A file read race existed in the execve() system call. As well, a number of bug fixes were made in the 9.1 kernel including : - Support for more machines that did not work with APIC - Audigy2 support - New/updated modules: prims25, adiusbadsl, thinkpad, ieee1394, orinoco, via-rhine, - Fixed SiS IOAPIC - IRQ balancing has been fixed for SMP - Updates to ext3 - The previous ptrace fix has been redone to work better - Bugs with compiling kernels using xconfig have been fixed - Problems with ipsec have been corrected - XFS ACLs are now present - gdb not working on XFS root filesystems has been fixed MandrakeSoft encourages all users to upgrade to these new kernels. Updated kernels will be available shortly for other supported platforms and architectures. For full instructions on how to properly upgrade your kernel, please review http://www.mandrakesecure.net/en/docs/magic.php. Update : The kernels provided in MDKSA-2003:066-1 (2.4.21-0.24mdk) had a problem where all files created on any filesystem other than XFS, and using any kernel other than kernel-secure, would be created with mode 0666, or world writeable. The 0.24mdk kernels have been removed from the mirrors and users are encouraged to upgrade and remove those kernels from their systems to prevent accidentally booting into them. That issue has been addressed and fixed with these new kernels.
    last seen2020-06-01
    modified2020-06-02
    plugin id14049
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14049
    titleMandrake Linux Security Advisory : kernel (MDKSA-2003:066-2)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-336.NASL
    descriptionA number of vulnerabilities have been discovered in the Linux kernel. - CAN-2002-1380: Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall) - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (
    last seen2020-06-01
    modified2020-06-02
    plugin id15173
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15173
    titleDebian DSA-336-1 : linux-kernel-2.2.20 - several vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-195.NASL
    descriptionUpdated kernel packages for Red Hat Enterprise Linux are now available which address several security vulnerabilities. The Linux kernel handles the basic functions of the operating system. Several security issues have been found that affect the Linux kernel : Al Viro found a security issue in the tty layer whereby any user could cause a kernel oops. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0247 to this issue. Andrea Arcangeli found an issue in the low-level mxcsr code in which a malformed address would leave garbage in cpu state registers. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0248 to this issue. The TCP/IP fragment reassembly handling allows remote attackers to cause a denial of service (CPU consumption) via packets that cause a large number of hash table collisions, a vulnerability similar to CVE-2003-0244. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0364 to this issue. These kernels also contain updated fixes for the ioperm security issue, as well as fixes for a number of bugs. It is recommended that users upgrade to these erratum kernels, which contain patches to correct these vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id12401
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12401
    titleRHEL 2.1 : kernel (RHSA-2003:195)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-332.NASL
    descriptionA number of vulnerabilities have been discovered in the Linux kernel. - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a binary compatibility interface (lcall) - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets - CAN-2003-0127: The kernel module loader allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel - CAN-2003-0244: The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions related to the PREROUTING chain - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (
    last seen2020-06-01
    modified2020-06-02
    plugin id15169
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15169
    titleDebian DSA-332-1 : linux-kernel-2.4.17 - several vulnerabilities

Oval

accepted2007-04-25T19:52:24.590-04:00
classvulnerability
contributors
  • nameJay Beale
    organizationBastille Linux
  • nameJay Beale
    organizationBastille Linux
  • nameThomas R. Jones
    organizationMaitreya Security
descriptionThe route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
familyunix
idoval:org.mitre.oval:def:261
statusaccepted
submitted2003-09-25T12:00:00.000-04:00
titleLinux Route Cache / Netfilter Denial of Service
version38

Redhat

advisories
  • rhsa
    idRHSA-2003:145
  • rhsa
    idRHSA-2003:147
  • rhsa
    idRHSA-2003:172