home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2003-074.nasl < prev    next >
Text File  |  2005-01-14  |  5KB  |  149 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2003:074
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(14057);
  12.  script_bugtraq_id(7791, 8042);
  13.  script_version ("$Revision: 1.3 $");
  14.  script_cve_id("CAN-2003-0001", "CAN-2003-0244", "CAN-2003-0246", "CAN-2003-0247", "CAN-2003-0248", "CAN-2003-0462");
  15.  
  16.  name["english"] = "MDKSA-2003:074: kernel";
  17.  
  18.  script_name(english:name["english"]);
  19.  
  20.  desc["english"] = "
  21. The remote host is missing the patch for the advisory MDKSA-2003:074 (kernel).
  22.  
  23.  
  24. Multiple vulnerabilities were discovered and fixed in the Linux kernel.
  25. * CAN-2003-0001: Multiple ethernet network card drivers do not pad frames with
  26. null bytes which allows remote attackers to obtain information from previous
  27. packets or kernel memory by using special malformed packets.
  28. * CAN-2003-0244: The route cache implementation in the 2.4 kernel and the
  29. Netfilter IP conntrack module allows remote attackers to cause a Denial of
  30. Service (DoS) via CPU consumption due to packets with forged source addresses
  31. that cause a large number of hash table collisions related to the PREROUTING
  32. chain.
  33. * CAN-2003-0246: The ioperm implementation in 2.4.20 and earlier kernels does
  34. not properly restrict privileges, which allows local users to gain read or write
  35. access to certain I/O ports.
  36. * CAN-2003-0247: A vulnerability in the TTY layer of the 2.4 kernel allows
  37. attackers to cause a kernel oops resulting in a DoS.
  38. * CAN-2003-0248: The mxcsr code in the 2.4 kernel allows attackers to modify CPU
  39. state registers via a malformed address.
  40. * CAN-2003-0462: A file read race existed in the execve() system call.
  41. Kernels for 9.1/x86 are also available (see MDKSA-2003:066).
  42. MandrakeSoft encourages all users to upgrade to these new kernels.
  43. For full instructions on how to properly upgrade your kernel, please review
  44. http://www.mandrakesecure.net/en/docs/magic.php.
  45.  
  46.  
  47. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074
  48. Risk factor : High";
  49.  
  50.  
  51.  
  52.  script_description(english:desc["english"]);
  53.  
  54.  summary["english"] = "Check for the version of the kernel package";
  55.  script_summary(english:summary["english"]);
  56.  
  57.  script_category(ACT_GATHER_INFO);
  58.  
  59.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  60.  family["english"] = "Mandrake Local Security Checks";
  61.  script_family(english:family["english"]);
  62.  
  63.  script_dependencies("ssh_get_info.nasl");
  64.  script_require_keys("Host/Mandrake/rpm-list");
  65.  exit(0);
  66. }
  67.  
  68. include("rpm.inc");
  69. if ( rpm_check( reference:"kernel-2.4.19.35mdk-1-1mdk", release:"MDK8.2", yank:"mdk") )
  70. {
  71.  security_hole(0);
  72.  exit(0);
  73. }
  74. if ( rpm_check( reference:"kernel-BOOT-2.4.19.35mdk-1-1mdk", release:"MDK8.2", yank:"mdk") )
  75. {
  76.  security_hole(0);
  77.  exit(0);
  78. }
  79. if ( rpm_check( reference:"kernel-doc-2.4.19-35mdk", release:"MDK8.2", yank:"mdk") )
  80. {
  81.  security_hole(0);
  82.  exit(0);
  83. }
  84. if ( rpm_check( reference:"kernel-enterprise-2.4.19.35mdk-1-1mdk", release:"MDK8.2", yank:"mdk") )
  85. {
  86.  security_hole(0);
  87.  exit(0);
  88. }
  89. if ( rpm_check( reference:"kernel-secure-2.4.19.35mdk-1-1mdk", release:"MDK8.2", yank:"mdk") )
  90. {
  91.  security_hole(0);
  92.  exit(0);
  93. }
  94. if ( rpm_check( reference:"kernel-smp-2.4.19.35mdk-1-1mdk", release:"MDK8.2", yank:"mdk") )
  95. {
  96.  security_hole(0);
  97.  exit(0);
  98. }
  99. if ( rpm_check( reference:"kernel-source-2.4.19-35mdk", release:"MDK8.2", yank:"mdk") )
  100. {
  101.  security_hole(0);
  102.  exit(0);
  103. }
  104. if ( rpm_check( reference:"kernel-2.4.19.35mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  105. {
  106.  security_hole(0);
  107.  exit(0);
  108. }
  109. if ( rpm_check( reference:"kernel-BOOT-2.4.19.35mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  110. {
  111.  security_hole(0);
  112.  exit(0);
  113. }
  114. if ( rpm_check( reference:"kernel-doc-2.4.19-35mdk", release:"MDK9.0", yank:"mdk") )
  115. {
  116.  security_hole(0);
  117.  exit(0);
  118. }
  119. if ( rpm_check( reference:"kernel-enterprise-2.4.19.35mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  120. {
  121.  security_hole(0);
  122.  exit(0);
  123. }
  124. if ( rpm_check( reference:"kernel-secure-2.4.19.35mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  125. {
  126.  security_hole(0);
  127.  exit(0);
  128. }
  129. if ( rpm_check( reference:"kernel-smp-2.4.19.35mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  130. {
  131.  security_hole(0);
  132.  exit(0);
  133. }
  134. if ( rpm_check( reference:"kernel-source-2.4.19-35mdk", release:"MDK9.0", yank:"mdk") )
  135. {
  136.  security_hole(0);
  137.  exit(0);
  138. }
  139. if (rpm_exists(rpm:"kernel-", release:"MDK8.2")
  140.  || rpm_exists(rpm:"kernel-", release:"MDK9.0") )
  141. {
  142.  set_kb_item(name:"CAN-2003-0001", value:TRUE);
  143.  set_kb_item(name:"CAN-2003-0244", value:TRUE);
  144.  set_kb_item(name:"CAN-2003-0246", value:TRUE);
  145.  set_kb_item(name:"CAN-2003-0247", value:TRUE);
  146.  set_kb_item(name:"CAN-2003-0248", value:TRUE);
  147.  set_kb_item(name:"CAN-2003-0462", value:TRUE);
  148. }
  149.