# This script was automatically generated from the dsa-450
# Debian Security Advisory
# It is released under the Nessus Script Licence.
# Advisory is copyright 1997-2004 Software in the Public Interest, Inc.
# See http://www.debian.org/license
# DSA2nasl Convertor is copyright 2004 Michel Arboi
if (! defined_func('bn_random')) exit(0);
desc = '
Several local root exploits have been discovered recently in the Linux
kernel. This security advisory updates the mips kernel 2.4.19 for
Debian GNU/Linux. The Common Vulnerabilities and Exposures project
identifies the following problems that are fixed with this update:
An integer overflow in brk() system call (do_brk() function) for
Linux allows a local attacker to gain root privileges. Fixed
upstream in Linux 2.4.23.
Paul Starzetz discovered
a flaw in bounds checking in mremap() in
the Linux kernel (present in version 2.4.x and 2.6.x) which may
allow a local attacker to gain root privileges. Version 2.2 is not
affected by this bug. Fixed upstream in Linux 2.4.24.
Paul Starzetz and Wojciech Purczynski of isec.pl discovered a
critical security vulnerability in the memory management code of
Linux inside the mremap(2) system call. Due to missing function
return value check of internal functions a local attacker can gain
root privileges. Fixed upstream in Linux 2.4.25 and 2.6.3.
For the stable distribution (woody) these problems have been fixed in
version 2.4.19-0.020911.1.woody3 of mips images and version
2.4.19-4.woody1 of kernel source.
For the unstable distribution (sid) this problem will be fixed soon
with the next upload of a 2.4.19 kernel image and in version
2.4.22-0.030928.3 for 2.4.22.
We recommend that you upgrade your Linux kernel packages immediately.
Vulnerability matrix for CAN-2004-0077
Solution : http://www.debian.org/security/2004/dsa-450
Risk factor : High';
if (description) {
script_id(15287);
script_version("$Revision: 1.4 $");
script_xref(name: "DSA", value: "450");
script_cve_id("CAN-2003-0961", "CAN-2003-0985", "CAN-2004-0077");
script_bugtraq_id(9138, 9356, 9686);
script_xref(name: "CERT", value: "981222");
script_description(english: desc);
script_copyright(english: "This script is (C) 2004 Michel Arboi");
script_name(english: "[DSA450] DSA-450-1 linux-kernel-2.4.19-mips");
script_category(ACT_GATHER_INFO);
script_family(english: "Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/Debian/dpkg-l");
script_summary(english: "DSA-450-1 linux-kernel-2.4.19-mips");
exit(0);
}
include("debian_package.inc");
w = 0;
if (deb_check(prefix: 'kernel-doc-2.4.19', release: '3.0', reference: '2.4.19-4.woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-doc-2.4.19 is vulnerable in Debian 3.0.\nUpgrade to kernel-doc-2.4.19_2.4.19-4.woody1\n');
}
if (deb_check(prefix: 'kernel-headers-2.4.19', release: '3.0', reference: '2.4.19-0.020911.1.woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-headers-2.4.19 is vulnerable in Debian 3.0.\nUpgrade to kernel-headers-2.4.19_2.4.19-0.020911.1.woody3\n');
}
if (deb_check(prefix: 'kernel-image-2.4.19-r4k-ip22', release: '3.0', reference: '2.4.19-0.020911.1.woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.4.19-r4k-ip22 is vulnerable in Debian 3.0.\nUpgrade to kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody3\n');
}
if (deb_check(prefix: 'kernel-image-2.4.19-r5k-ip22', release: '3.0', reference: '2.4.19-0.020911.1.woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-image-2.4.19-r5k-ip22 is vulnerable in Debian 3.0.\nUpgrade to kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody3\n');
}
if (deb_check(prefix: 'kernel-patch-2.4.19-mips', release: '3.0', reference: '2.4.19-0.020911.1.woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-patch-2.4.19-mips is vulnerable in Debian 3.0.\nUpgrade to kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody3\n');
}
if (deb_check(prefix: 'kernel-source-2.4.19', release: '3.0', reference: '2.4.19-4.woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.4.19 is vulnerable in Debian 3.0.\nUpgrade to kernel-source-2.4.19_2.4.19-4.woody1\n');
}
if (deb_check(prefix: 'mips-tools', release: '3.0', reference: '2.4.19-0.020911.1.woody3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mips-tools is vulnerable in Debian 3.0.\nUpgrade to mips-tools_2.4.19-0.020911.1.woody3\n');
}
if (deb_check(prefix: 'kernel-source-2.4.19,', release: '3.0', reference: '2.4.19-0.020911.1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package kernel-source-2.4.19, is vulnerable in Debian woody.\nUpgrade to kernel-source-2.4.19,_2.4.19-0.020911.1\n');
}
if (w) { security_hole(port: 0, data: desc); }