home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2004-015.nasl < prev    next >
Text File  |  2005-01-14  |  4KB  |  144 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2004:015
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(14115);
  12.  script_bugtraq_id(9570, 9691);
  13.  script_version ("$Revision: 1.3 $");
  14.  script_cve_id("CAN-2004-0003", "CAN-2004-0010", "CAN-2004-0075", "CAN-2004-0077");
  15.  
  16.  name["english"] = "MDKSA-2004:015: kernel";
  17.  
  18.  script_name(english:name["english"]);
  19.  
  20.  desc["english"] = "
  21. The remote host is missing the patch for the advisory MDKSA-2004:015 (kernel).
  22.  
  23.  
  24. Paul Staretz discovered a flaw in return value checking in the mremap() function
  25. in the Linux kernel, versions 2.4.24 and previous that could allow a local user
  26. to obtain root privileges.
  27. A vulnerability was found in the R128 DRI driver by Alan Cox. This could allow
  28. local privilege escalation.
  29. A flaw in the ncp_lookup() function in the ncpfs code (which is used to mount
  30. NetWare volumes or print to NetWare printers) was found by Arjen van de Ven that
  31. could allow local privilege escalation.
  32. The Vicam USB driver in Linux kernel versions prior to 2.4.25 does not use the
  33. copy_from_user function to access userspace, which crosses security boundaries.
  34. This problem does not affect the Mandrake Linux 9.2 kernel.
  35. Additionally, a ptrace hole that only affects the amd64/x86_64 platform has been
  36. corrected.
  37. The provided packages are patched to fix these vulnerabilities. All users are
  38. encouraged to upgrade to these updated kernels.
  39. To update your kernel, please follow the directions located at:
  40. http://www.mandrakesecure.net/en/kernelupdate.php
  41.  
  42.  
  43. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:015
  44. Risk factor : High";
  45.  
  46.  
  47.  
  48.  script_description(english:desc["english"]);
  49.  
  50.  summary["english"] = "Check for the version of the kernel package";
  51.  script_summary(english:summary["english"]);
  52.  
  53.  script_category(ACT_GATHER_INFO);
  54.  
  55.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  56.  family["english"] = "Mandrake Local Security Checks";
  57.  script_family(english:family["english"]);
  58.  
  59.  script_dependencies("ssh_get_info.nasl");
  60.  script_require_keys("Host/Mandrake/rpm-list");
  61.  exit(0);
  62. }
  63.  
  64. include("rpm.inc");
  65. if ( rpm_check( reference:"kernel-2.4.19.38mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  66. {
  67.  security_hole(0);
  68.  exit(0);
  69. }
  70. if ( rpm_check( reference:"kernel-enterprise-2.4.19.38mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  71. {
  72.  security_hole(0);
  73.  exit(0);
  74. }
  75. if ( rpm_check( reference:"kernel-secure-2.4.19.38mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  76. {
  77.  security_hole(0);
  78.  exit(0);
  79. }
  80. if ( rpm_check( reference:"kernel-smp-2.4.19.38mdk-1-1mdk", release:"MDK9.0", yank:"mdk") )
  81. {
  82.  security_hole(0);
  83.  exit(0);
  84. }
  85. if ( rpm_check( reference:"kernel-source-2.4.19-38mdk", release:"MDK9.0", yank:"mdk") )
  86. {
  87.  security_hole(0);
  88.  exit(0);
  89. }
  90. if ( rpm_check( reference:"kernel-2.4.21.0.28mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  91. {
  92.  security_hole(0);
  93.  exit(0);
  94. }
  95. if ( rpm_check( reference:"kernel-secure-2.4.21.0.28mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  96. {
  97.  security_hole(0);
  98.  exit(0);
  99. }
  100. if ( rpm_check( reference:"kernel-smp-2.4.21.0.28mdk-1-1mdk", release:"MDK9.1", yank:"mdk") )
  101. {
  102.  security_hole(0);
  103.  exit(0);
  104. }
  105. if ( rpm_check( reference:"kernel-source-2.4.21-0.28mdk", release:"MDK9.1", yank:"mdk") )
  106. {
  107.  security_hole(0);
  108.  exit(0);
  109. }
  110. if ( rpm_check( reference:"kernel-2.4.22.28mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  111. {
  112.  security_hole(0);
  113.  exit(0);
  114. }
  115. if ( rpm_check( reference:"kernel-enterprise-2.4.22.28mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  116. {
  117.  security_hole(0);
  118.  exit(0);
  119. }
  120. if ( rpm_check( reference:"kernel-secure-2.4.22.28mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  121. {
  122.  security_hole(0);
  123.  exit(0);
  124. }
  125. if ( rpm_check( reference:"kernel-smp-2.4.22.28mdk-1-1mdk", release:"MDK9.2", yank:"mdk") )
  126. {
  127.  security_hole(0);
  128.  exit(0);
  129. }
  130. if ( rpm_check( reference:"kernel-source-2.4.22-28mdk", release:"MDK9.2", yank:"mdk") )
  131. {
  132.  security_hole(0);
  133.  exit(0);
  134. }
  135. if (rpm_exists(rpm:"kernel-", release:"MDK9.0")
  136.  || rpm_exists(rpm:"kernel-", release:"MDK9.1")
  137.  || rpm_exists(rpm:"kernel-", release:"MDK9.2") )
  138. {
  139.  set_kb_item(name:"CAN-2004-0003", value:TRUE);
  140.  set_kb_item(name:"CAN-2004-0010", value:TRUE);
  141.  set_kb_item(name:"CAN-2004-0075", value:TRUE);
  142.  set_kb_item(name:"CAN-2004-0077", value:TRUE);
  143. }
  144.